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", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="2000020000000000fcffffff0700000001000080ff0f000004000000", @ANYRES32=0x0, @ANYBLOB="20000200020000000700000006000000030000000200000003000000", @ANYRES32=0x0, @ANYBLOB="2000020008000000094e000000000000f7ffffff0900000003000000", @ANYRES32=0x0, @ANYBLOB="20000200ff010000bd0600000400000002000000ff03000001000000", @ANYRES32=0x0, @ANYBLOB="200002001f0000008000000007000000cc0f0000ffff000002000000", @ANYRES32=r3, @ANYBLOB="200002000101000009000000020000000800001011a1000002000000", @ANYRES32=r6, @ANYBLOB="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"], 0x4778}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:59:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r5 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, 0x0) 19:59:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000}]) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="020000000100020000000000", @ANYRES32, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000da5e000000000000", @ANYBLOB="67090b59b7d24da4582b0829c02149a2c745c5cc9d6b205d79cf6bdab837fad282e0efea705f45748795408d6fe3a9efeb2c9c33064a941cfbf374ffd5ad1d60adedc5e8171f82d0bb2004a4d02be87fa0c598dcae644f8ac637206be423f11fde52cb1e4e5875ea91c86be8b88bca18a480a9a2b38b88545dcab856077f2c3ca816885249e53eb94dd7c93bf0e767b93bc0e1285e37815e08fd62e9477d05c36eacedd91a97d57a3c9ff08e20", @ANYBLOB='\b\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="38d9fd209e59ba3492707819fd3060fb3976fb96204be126274a32520ab084779f4f2615f601b1412db9e7dc85ac5621b5606508d79cfe8b416c65322aba89d15ca8858a9e99567053d952ec8529f9fbff884627f19be48692e36f607ad33da169b4c879c006cd4cb0688a3a707b2eb95a863391b6a862e87e20a85d6ffe41fab346e733fa595274bd6e30d1626ab3b5", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYBLOB="b23bb165a56e2df0fd302df210e14f4f204f723bfb7de2f998043476a798020000006f9e3eee1df579b538f02473a584f5408f18b5290f89e7c4e4cbd20e5aee3f52a5a6c492ba6502c0954d9f43f1b522e1df5b17a0841494f0351e2a1c28", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES16], 0x14, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000480)={0x90, 0x0, 0x7, {0x0, 0x3, 0x6, 0x200, 0x1f, 0x5, {0x6, 0xe16b, 0x0, 0xe4de, 0x1f, 0x3, 0x4, 0xc0, 0x5, 0x100, 0x9, 0x0, 0x0, 0x6}}}, 0x90) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@loopback, @in=@multicast1, 0x4e20, 0x8001, 0x4e21, 0xfffe, 0xa, 0x0, 0x0, 0x2e}, {0xfff, 0x6933, 0x3, 0x9, 0x80, 0xffffffffffffffe0, 0x0, 0x3}, {0xe53d}, 0x29b2, 0x6e6bbe, 0x1, 0x1, 0x2, 0x2}, {{@in=@multicast2, 0x4d6, 0xcd}, 0x0, @in=@remote, 0x3504, 0x0, 0x3, 0x40, 0x0, 0x39d9, 0x3}}, 0xe8) r2 = socket(0x0, 0x2, 0x0) getsockopt$inet6_int(r2, 0x29, 0xd0, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100299e700000000000090000002000038014000200fee9f99da9626f6e645f736c6176655f310000000005000800f9000000"], 0x34}}, 0xc044) setregid(0x0, 0x0) 19:59:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1, 'lblc\x00'}, 0x2c) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x10) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000080)=""/34) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000001280)={0x20000000000084, @rand_addr, 0x0, 0x200000001, 'lblcr\x00', 0x32, 0x0, 0x1fff}, 0x2c) 19:59:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r5 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, 0x0) 19:59:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 19:59:31 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) shutdown(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGETLINKNAME(r3, 0x89e0, &(0x7f0000000000)={0x0, 0x2}) recvmmsg(r0, &(0x7f0000001980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x102, 0x0) 19:59:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="9c000dc3a0bbc8cfa1b117cb138c257f52555a0500000000000000", @ANYRES16, @ANYBLOB="20002cbd7000ffdbdf25140000000600ed00d5060000080001000400000006003600008000005200ac00105c7c38b40009757ff5816a6d529294cdad47d08f8def182476d885b64add46c3f1b0e5379b143312e80f9336ada1d89c027e2fbc822750de77620f3ba12bd0be1ac8f1fec08bd1e2c6bb15b118000012000400000005007400020000000a000600bbbbbbbbbbbb00000000"], 0x9c}, 0x1, 0x0, 0x0, 0x800}, 0x80000) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000009000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000780)="f390260f561a0f01c20f32dd83f9ffaa0f58ea66b93c0a000066b8d57b000066ba000000000f30f36d66b8000000000f23d00f21f86635000000090f23f8"}], 0x1, 0x1, 0x0, 0x46) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) signalfd4(r3, &(0x7f00000001c0)={[0x6c]}, 0x8, 0x80000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:59:32 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) ioctl(r0, 0x1, &(0x7f0000000100)="6865a0219cb566439d48405b2cc0e758bc8e409f9d8c36a41d3787d310aeb03e1f598adace328e719ebe52d6dc9b681be44f562a9f11140bb9bfa1438894cc2a8767905267a7f2407ac02f296aacb657c658f4a36a6e991d0b9bdc40a016b793477bc663d0d226451080fb96dbae56bf4e3a9695bf70613733e62a6425333426f801a482e9324a5c9aa713d8a418b353ce95135aeac092f279cd485b7a91b43fc3") dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xec57}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r2, &(0x7f0000000280)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev}}, 0x1c) 19:59:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 19:59:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000}]) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="020000000100020000000000", @ANYRES32, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000da5e000000000000", @ANYBLOB="67090b59b7d24da4582b0829c02149a2c745c5cc9d6b205d79cf6bdab837fad282e0efea705f45748795408d6fe3a9efeb2c9c33064a941cfbf374ffd5ad1d60adedc5e8171f82d0bb2004a4d02be87fa0c598dcae644f8ac637206be423f11fde52cb1e4e5875ea91c86be8b88bca18a480a9a2b38b88545dcab856077f2c3ca816885249e53eb94dd7c93bf0e767b93bc0e1285e37815e08fd62e9477d05c36eacedd91a97d57a3c9ff08e20", @ANYBLOB='\b\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="38d9fd209e59ba3492707819fd3060fb3976fb96204be126274a32520ab084779f4f2615f601b1412db9e7dc85ac5621b5606508d79cfe8b416c65322aba89d15ca8858a9e99567053d952ec8529f9fbff884627f19be48692e36f607ad33da169b4c879c006cd4cb0688a3a707b2eb95a863391b6a862e87e20a85d6ffe41fab346e733fa595274bd6e30d1626ab3b5", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYBLOB="b23bb165a56e2df0fd302df210e14f4f204f723bfb7de2f998043476a798020000006f9e3eee1df579b538f02473a584f5408f18b5290f89e7c4e4cbd20e5aee3f52a5a6c492ba6502c0954d9f43f1b522e1df5b17a0841494f0351e2a1c28", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES16], 0x14, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000480)={0x90, 0x0, 0x7, {0x0, 0x3, 0x6, 0x200, 0x1f, 0x5, {0x6, 0xe16b, 0x0, 0xe4de, 0x1f, 0x3, 0x4, 0xc0, 0x5, 0x100, 0x9, 0x0, 0x0, 0x6}}}, 0x90) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@loopback, @in=@multicast1, 0x4e20, 0x8001, 0x4e21, 0xfffe, 0xa, 0x0, 0x0, 0x2e}, {0xfff, 0x6933, 0x3, 0x9, 0x80, 0xffffffffffffffe0, 0x0, 0x3}, {0xe53d}, 0x29b2, 0x6e6bbe, 0x1, 0x1, 0x2, 0x2}, {{@in=@multicast2, 0x4d6, 0xcd}, 0x0, @in=@remote, 0x3504, 0x0, 0x3, 0x40, 0x0, 0x39d9, 0x3}}, 0xe8) r2 = socket(0x0, 0x2, 0x0) getsockopt$inet6_int(r2, 0x29, 0xd0, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100299e700000000000090000002000038014000200fee9f99da9626f6e645f736c6176655f310000000005000800f9000000"], 0x34}}, 0xc044) setregid(0x0, 0x0) 19:59:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:32 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x610) bind(r2, &(0x7f0000000080)=@tipc=@id={0x1e, 0x3, 0x0, {0x4e24, 0x1}}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000005c0)=0x14) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x5}, @IFLA_BOND_PRIMARY={0x8}]}}}]}, 0x44}}, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r7, 0x117, 0x5, 0x0, 0xbcf) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="3800000024006d7f528e09000000000000000058", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100686866000c000200080003"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 19:59:33 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) [ 575.759553] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8129 comm=syz-executor.5 [ 575.790281] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8129 comm=syz-executor.5 [ 575.988108] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8129 comm=syz-executor.5 19:59:33 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) [ 576.226283] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8129 comm=syz-executor.5 [ 576.248805] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8129 comm=syz-executor.5 19:59:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="9c000dc3a0bbc8cfa1b117cb138c257f52555a0500000000000000", @ANYRES16, @ANYBLOB="20002cbd7000ffdbdf25140000000600ed00d5060000080001000400000006003600008000005200ac00105c7c38b40009757ff5816a6d529294cdad47d08f8def182476d885b64add46c3f1b0e5379b143312e80f9336ada1d89c027e2fbc822750de77620f3ba12bd0be1ac8f1fec08bd1e2c6bb15b118000012000400000005007400020000000a000600bbbbbbbbbbbb00000000"], 0x9c}, 0x1, 0x0, 0x0, 0x800}, 0x80000) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000009000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000780)="f390260f561a0f01c20f32dd83f9ffaa0f58ea66b93c0a000066b8d57b000066ba000000000f30f36d66b8000000000f23d00f21f86635000000090f23f8"}], 0x1, 0x1, 0x0, 0x46) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) signalfd4(r3, &(0x7f00000001c0)={[0x6c]}, 0x8, 0x80000) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 576.273659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8129 comm=syz-executor.5 [ 576.303394] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8129 comm=syz-executor.5 [ 576.337778] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8190 comm=syz-executor.5 [ 576.338476] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8129 comm=syz-executor.5 19:59:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff, 0x1ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x610) pread64(r1, &(0x7f0000000080)=""/66, 0x42, 0x7f) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendfile(r2, r0, 0x0, 0x800000080004103) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x8) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(r3, 0x40184150, &(0x7f0000000840)={0x0, &(0x7f0000000780)="a4a41cf39bcf716ff73e4fcfa15d67eaec1a8c437fb492fc64e4fb2e041eac868a00282eb5eb41aad311f0202d9899cf821893464d2972c461c1d1c0b48e59efad28429d08a2853a5d45c40d88c54776c212c29322b406399b018782d477550d5d39b2220df9ebb7de9c981c9eab5c25c9674dc6e32d8af902c1ade9c0617e70e42fd53706884133d1d95f29216bc337dff3261c23a042de644457219be673ed09395acc958aae64ad6a6427185182d4", 0xb0}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 19:59:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) [ 576.712430] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8190 comm=syz-executor.5 19:59:34 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x610) bind(r2, &(0x7f0000000080)=@tipc=@id={0x1e, 0x3, 0x0, {0x4e24, 0x1}}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000005c0)=0x14) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x5}, @IFLA_BOND_PRIMARY={0x8}]}}}]}, 0x44}}, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r7, 0x117, 0x5, 0x0, 0xbcf) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="3800000024006d7f528e09000000000000000058", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100686866000c000200080003"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 19:59:34 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) ioctl(r0, 0x1, &(0x7f0000000100)="6865a0219cb566439d48405b2cc0e758bc8e409f9d8c36a41d3787d310aeb03e1f598adace328e719ebe52d6dc9b681be44f562a9f11140bb9bfa1438894cc2a8767905267a7f2407ac02f296aacb657c658f4a36a6e991d0b9bdc40a016b793477bc663d0d226451080fb96dbae56bf4e3a9695bf70613733e62a6425333426f801a482e9324a5c9aa713d8a418b353ce95135aeac092f279cd485b7a91b43fc3") dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xec57}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r2, &(0x7f0000000280)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev}}, 0x1c) 19:59:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:34 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) ioctl(r0, 0x1, &(0x7f0000000100)="6865a0219cb566439d48405b2cc0e758bc8e409f9d8c36a41d3787d310aeb03e1f598adace328e719ebe52d6dc9b681be44f562a9f11140bb9bfa1438894cc2a8767905267a7f2407ac02f296aacb657c658f4a36a6e991d0b9bdc40a016b793477bc663d0d226451080fb96dbae56bf4e3a9695bf70613733e62a6425333426f801a482e9324a5c9aa713d8a418b353ce95135aeac092f279cd485b7a91b43fc3") dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xec57}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r2, &(0x7f0000000280)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev}}, 0x1c) 19:59:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r5 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, 0x0) 19:59:35 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r1, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 19:59:35 executing program 5: r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@ipv4={[], [], @loopback}, 0x78}) ioctl$TCGETA(r0, 0x5405, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) ioctl$void(r2, 0x1) mlockall(0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000000c0)={{0x0, 0x3, 0x4}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0xc125, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x3}, 0x0) sched_getattr(r3, &(0x7f0000000000)={0x38}, 0x38, 0x0) rt_sigaction(0x0, &(0x7f0000000140)={0x0, 0xd0000005, 0x0, {[0x20080000000]}}, &(0x7f0000000200)={&(0x7f0000000180)="43c0d3a0c461785df7460f464c920f40cfc401d4556000de4dfed1c347813609000000c4a21d2e4a053e6636411400", 0x0, 0x0}, 0x8, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0)={0xfffffffe, 0x5, 0x4, 0x3, 0xfffffff9}, 0x14) 19:59:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) syz_mount_image$iso9660(&(0x7f00000004c0)='iso9660\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYRES64=0x0, @ANYRESOCT=0x0, @ANYBLOB="2c63727566742c696f636861727365743d6d6163726f6d616e69616e2c6e6f636f6d70726573732c7065726d69745f646972656374696f2c6d61736b3d4d41595f455845432c7375626a5f757365723d5e766d6e6574307b7b25776c616e3176626f786e6574312c6f626a5f757365723d656d3147504c287da52c7569643e", @ANYRESOCT=r0, @ANYBLOB=',defcontext=unconbined_u,appraise,\x00']) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) fstat(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) 19:59:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r5 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, 0x0) 19:59:35 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x1}, 0x14}}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x3}, 0x0) ptrace$getenv(0x4201, r3, 0x5, &(0x7f0000000100)) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r2, 0x10, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x3, 0x9}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xfff, 0xffffffffffffffff}}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x30}, @NL80211_ATTR_VLAN_ID={0x6, 0x11a, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004c00}, 0x400c040) 19:59:35 executing program 2: creat(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"]}, 0x1, 0x0, 0x0, 0xc850}, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f000002eff0)={0x0, 0x0}, 0x10) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) geteuid() geteuid() write(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000100), 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000032280)=""/102379) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r4, 0x80284504, &(0x7f0000032280)=""/102379) r5 = memfd_create(&(0x7f0000000000)='dummY0\x00', 0x0) fsetxattr$system_posix_acl(r5, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYBLOB="f4c42b45381592d286ef33d2be4db6c3af3f3a5da34227beecf3077d3343385e154d1fad42c659c9085a12cd2c4b2e58088b77e196e1f2cd90114ee84958eae15f95f4aa538da7722c41897e22dbea74d33fd33c0559b8dc7c0103d88e08c36cbc2b7dcfabcfbaaf0f5e072104b4c6139538e7f8cf8052e5a05b57d0e654590ca668b09faefbcce9f68a07771b9fdd2f7feee85cf70bb5dfdad1b5f0bfbf5687a2fb", @ANYRES32, @ANYBLOB="0400000007000000080000", @ANYRES32=0x0, @ANYBLOB="10000200000000082000000000000000bf6ba308525fb82df4d1ae00a29f40e06b000000000000000000000000000000cb967802a35d8cf51cd8a6b0caae714e399af327eca1a4e4fe36e2648cd3bcc59a1b37cd350944aa459f1d304fa8b17722736a44510363745431f26bc2e31a60a275bc6211731f0361878aa0c2930a0e00920006e9fdb4eae261d4c02c1fe9c5659f5d672bf342eacd48f6806b46"], 0x6, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@un=@abs={0x1, 0x0, 0x4e22}, 0x80) r6 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x0, 0x100000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}}) [ 578.052059] ISOFS: Unable to identify CD-ROM format. 19:59:35 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) ioctl(r0, 0x1, &(0x7f0000000100)="6865a0219cb566439d48405b2cc0e758bc8e409f9d8c36a41d3787d310aeb03e1f598adace328e719ebe52d6dc9b681be44f562a9f11140bb9bfa1438894cc2a8767905267a7f2407ac02f296aacb657c658f4a36a6e991d0b9bdc40a016b793477bc663d0d226451080fb96dbae56bf4e3a9695bf70613733e62a6425333426f801a482e9324a5c9aa713d8a418b353ce95135aeac092f279cd485b7a91b43fc3") dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xec57}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r2, &(0x7f0000000280)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev}}, 0x1c) [ 578.125958] ISOFS: Unable to identify CD-ROM format. 19:59:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r5 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, 0x0) 19:59:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYPTR, @ANYRESDEC], 0x2}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f000002eff0)={0x0, 0x0}, 0x10) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) geteuid() geteuid() setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000100), 0x4) r4 = syz_open_dev$evdev(0x0, 0x1ff, 0x0) ioctl$EVIOCGKEYCODE_V2(r4, 0x80284504, &(0x7f0000032280)=""/102379) r5 = memfd_create(&(0x7f0000000000)='dummY0\x00', 0x0) fsetxattr$system_posix_acl(r5, 0x0, &(0x7f0000000640)=ANY=[@ANYRES64=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="040000000700000008006410373e32ca11b00f4577ec6a6abc9ac740cf940e75648f00", @ANYRES32=0x0, @ANYBLOB="10000200000000082000000000000000bf6ba308525fb82df4d1ae00a29f40e06b000000000000000000000000000000cb967802a35d8cf51cd8a6b0caae714e399af327eca1a4e4fe36e2648cd3bcc59a1b37cd350944aa459f1d304fa8b17722736a44510363745431f26bc2e31a60a275bc6211731f0361878aa0c2930a0e00920006e9fdb4eae261d4c02c1fe9c5659f5d672bf342eacd48f6806b46"], 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 19:59:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r1, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 19:59:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r1, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 19:59:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r5 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, 0x0) 19:59:36 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x224440, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000100)=0xdc7a) r1 = getpid() ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000480)=0x10000) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f00000000c0)) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x118}, 0x1, 0x0, 0x0, 0x20000094}, 0x4000) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 19:59:37 executing program 5: r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@ipv4={[], [], @loopback}, 0x78}) ioctl$TCGETA(r0, 0x5405, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) ioctl$void(r2, 0x1) mlockall(0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000000c0)={{0x0, 0x3, 0x4}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0xc125, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x3}, 0x0) sched_getattr(r3, &(0x7f0000000000)={0x38}, 0x38, 0x0) rt_sigaction(0x0, &(0x7f0000000140)={0x0, 0xd0000005, 0x0, {[0x20080000000]}}, &(0x7f0000000200)={&(0x7f0000000180)="43c0d3a0c461785df7460f464c920f40cfc401d4556000de4dfed1c347813609000000c4a21d2e4a053e6636411400", 0x0, 0x0}, 0x8, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0)={0xfffffffe, 0x5, 0x4, 0x3, 0xfffffff9}, 0x14) 19:59:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000e86000), 0x0) geteuid() r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e61, 0x8001, @empty, 0x1}, {0xa, 0x4e21, 0x1000ddf3, @rand_addr="a2dcfdf0671c0df10d250b0bba6f9ec1"}, r1, 0x9}}, 0x48) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2710, @host}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="ff02003170f5b1ea4ad1e814fc9a1668d77900000000000000000000000001000004d232000000000008000000000000000000000000000400000000000000ffffff7f00000000bf03000000000000090000000000000007000080000000000700000400000000"], 0x2}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x5}, @IFLA_BOND_PRIMARY={0x8}]}}}]}, 0x44}}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) 19:59:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r5 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, 0x0) 19:59:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r5 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, 0x0) 19:59:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x10c81, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELRULE={0x2c, 0x8, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}]}], {0x14, 0x10}}, 0x74}}, 0x0) 19:59:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r5 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, 0x0) 19:59:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000140)="2a9b88a1f7491b303b062529d3a8d0d135fe5df646bd41f90a35b32a342d108da285951d6cfb242f781b922231457f9d7d5c6fba12e152d9", 0x38}, {&(0x7f0000000180)="b2ea4d1d7844a4fd324b8fac81f868d8ed9741a5220d3e3a9e3f1f35f21a252575359a2b8e5e3e7bc610b7550267066e96ca22d025ac1fc6ad7a94296edb3a521301f1c88cdeeb581654b07a03a5d7a240dfa7b7a6b64b539401d144", 0x5c}], 0x2, 0x2) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x7f) sendfile(r3, 0xffffffffffffffff, 0x0, 0xffffffff) connect(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 19:59:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000007640)=[{{&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000007b40)=[{&(0x7f0000007c40)=""/197, 0xc5}, {&(0x7f00000000c0)}, {&(0x7f0000007d40)=""/102400, 0x19000}, {&(0x7f00000079c0)=""/180, 0xb4}, {&(0x7f0000000340)=""/77, 0x4d}, {&(0x7f0000007a80)=""/138, 0x8a}], 0x6, &(0x7f0000000480)=""/239, 0xef}, 0x101}, {{&(0x7f0000000580)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000600)=""/140, 0x8c}, {0x0}, {0x0}, {&(0x7f0000000880)=""/107, 0x6b}], 0x4, &(0x7f0000000a80)=""/66, 0x42}, 0xe1e}, {{0x0, 0x0, &(0x7f0000000c00)}, 0xffffffff}, {{&(0x7f0000000c40)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000003180)=[{&(0x7f00000006c0)=""/106, 0x6a}, {&(0x7f0000000d40)=""/148, 0x94}, {&(0x7f0000000e00)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001f00)=""/206, 0xce}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/203, 0xcb}, {&(0x7f0000003100)=""/107, 0x6b}], 0x8, &(0x7f0000003200)=""/36, 0x24}, 0xd07}, {{0x0, 0x0, &(0x7f0000004500)=[{&(0x7f00000032c0)=""/142, 0x8e}, {&(0x7f0000003380)=""/120, 0x78}, {&(0x7f0000003400)=""/254, 0xfe}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x4}, 0x3}, {{&(0x7f0000004540)=@isdn, 0x80, &(0x7f0000005a00)=[{&(0x7f00000045c0)=""/60, 0x3c}, {&(0x7f0000004600)=""/83, 0x53}, {&(0x7f0000004680)=""/66, 0x42}, {&(0x7f0000004700)=""/104, 0x68}, {&(0x7f0000004780)=""/246, 0xf6}, {&(0x7f0000004880)=""/247, 0xf7}, {&(0x7f0000004980)=""/96, 0x60}, {&(0x7f0000004a00)=""/4096, 0x1000}], 0x8, &(0x7f0000000cc0)=""/103, 0x67}, 0x8}, {{&(0x7f0000005b00)=@generic, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000005b80)=""/45, 0x2d}], 0x1, &(0x7f0000005c00)=""/40, 0x28}, 0x10000}, {{&(0x7f0000006480)=@ipx, 0x80, &(0x7f0000005e00)=[{&(0x7f0000000740)=""/255, 0xff}, {&(0x7f00000003c0)=""/73, 0x49}, {&(0x7f0000000900)=""/184, 0xb8}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000001e00)=""/208, 0xd0}, {&(0x7f0000005c40)=""/214, 0xd6}, {&(0x7f0000005d40)=""/139, 0x8b}, {&(0x7f00000009c0)=""/23, 0x17}, {&(0x7f0000000a40)=""/28, 0x1c}], 0x9, &(0x7f0000007540)=""/251, 0xfb}, 0xe23c}], 0x8, 0x40000121, 0x0) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000100)}) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x3}, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f00000000c0)={0x2}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0xc0485661, &(0x7f0000005f80)={0x3, 0x2, @stop_pts=0x20}) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/mdstat\x00', 0x0, 0x0) 19:59:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000e86000), 0x0) geteuid() r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e61, 0x8001, @empty, 0x1}, {0xa, 0x4e21, 0x1000ddf3, @rand_addr="a2dcfdf0671c0df10d250b0bba6f9ec1"}, r1, 0x9}}, 0x48) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2710, @host}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="ff02003170f5b1ea4ad1e814fc9a1668d77900000000000000000000000001000004d232000000000008000000000000000000000000000400000000000000ffffff7f00000000bf03000000000000090000000000000007000080000000000700000400000000"], 0x2}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x5}, @IFLA_BOND_PRIMARY={0x8}]}}}]}, 0x44}}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) 19:59:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000e86000), 0x0) geteuid() r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e61, 0x8001, @empty, 0x1}, {0xa, 0x4e21, 0x1000ddf3, @rand_addr="a2dcfdf0671c0df10d250b0bba6f9ec1"}, r1, 0x9}}, 0x48) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2710, @host}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="ff02003170f5b1ea4ad1e814fc9a1668d77900000000000000000000000001000004d232000000000008000000000000000000000000000400000000000000ffffff7f00000000bf03000000000000090000000000000007000080000000000700000400000000"], 0x2}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x5}, @IFLA_BOND_PRIMARY={0x8}]}}}]}, 0x44}}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) 19:59:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000007640)=[{{&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000007b40)=[{&(0x7f0000007c40)=""/197, 0xc5}, {&(0x7f00000000c0)}, {&(0x7f0000007d40)=""/102400, 0x19000}, {&(0x7f00000079c0)=""/180, 0xb4}, {&(0x7f0000000340)=""/77, 0x4d}, {&(0x7f0000007a80)=""/138, 0x8a}], 0x6, &(0x7f0000000480)=""/239, 0xef}, 0x101}, {{&(0x7f0000000580)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000600)=""/140, 0x8c}, {0x0}, {0x0}, {&(0x7f0000000880)=""/107, 0x6b}], 0x4, &(0x7f0000000a80)=""/66, 0x42}, 0xe1e}, {{0x0, 0x0, &(0x7f0000000c00)}, 0xffffffff}, {{&(0x7f0000000c40)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000003180)=[{&(0x7f00000006c0)=""/106, 0x6a}, {&(0x7f0000000d40)=""/148, 0x94}, {&(0x7f0000000e00)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001f00)=""/206, 0xce}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/203, 0xcb}, {&(0x7f0000003100)=""/107, 0x6b}], 0x8, &(0x7f0000003200)=""/36, 0x24}, 0xd07}, {{0x0, 0x0, &(0x7f0000004500)=[{&(0x7f00000032c0)=""/142, 0x8e}, {&(0x7f0000003380)=""/120, 0x78}, {&(0x7f0000003400)=""/254, 0xfe}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x4}, 0x3}, {{&(0x7f0000004540)=@isdn, 0x80, &(0x7f0000005a00)=[{&(0x7f00000045c0)=""/60, 0x3c}, {&(0x7f0000004600)=""/83, 0x53}, {&(0x7f0000004680)=""/66, 0x42}, {&(0x7f0000004700)=""/104, 0x68}, {&(0x7f0000004780)=""/246, 0xf6}, {&(0x7f0000004880)=""/247, 0xf7}, {&(0x7f0000004980)=""/96, 0x60}, {&(0x7f0000004a00)=""/4096, 0x1000}], 0x8, &(0x7f0000000cc0)=""/103, 0x67}, 0x8}, {{&(0x7f0000005b00)=@generic, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000005b80)=""/45, 0x2d}], 0x1, &(0x7f0000005c00)=""/40, 0x28}, 0x10000}, {{&(0x7f0000006480)=@ipx, 0x80, &(0x7f0000005e00)=[{&(0x7f0000000740)=""/255, 0xff}, {&(0x7f00000003c0)=""/73, 0x49}, {&(0x7f0000000900)=""/184, 0xb8}, {&(0x7f0000000840)=""/23, 0x17}, {&(0x7f0000001e00)=""/208, 0xd0}, {&(0x7f0000005c40)=""/214, 0xd6}, {&(0x7f0000005d40)=""/139, 0x8b}, {&(0x7f00000009c0)=""/23, 0x17}, {&(0x7f0000000a40)=""/28, 0x1c}], 0x9, &(0x7f0000007540)=""/251, 0xfb}, 0xe23c}], 0x8, 0x40000121, 0x0) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000100)}) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x3}, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f00000000c0)={0x2}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0xc0485661, &(0x7f0000005f80)={0x3, 0x2, @stop_pts=0x20}) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/mdstat\x00', 0x0, 0x0) 19:59:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:38 executing program 5: r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@ipv4={[], [], @loopback}, 0x78}) ioctl$TCGETA(r0, 0x5405, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) ioctl$void(r2, 0x1) mlockall(0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000000c0)={{0x0, 0x3, 0x4}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0xc125, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x3}, 0x0) sched_getattr(r3, &(0x7f0000000000)={0x38}, 0x38, 0x0) rt_sigaction(0x0, &(0x7f0000000140)={0x0, 0xd0000005, 0x0, {[0x20080000000]}}, &(0x7f0000000200)={&(0x7f0000000180)="43c0d3a0c461785df7460f464c920f40cfc401d4556000de4dfed1c347813609000000c4a21d2e4a053e6636411400", 0x0, 0x0}, 0x8, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0)={0xfffffffe, 0x5, 0x4, 0x3, 0xfffffff9}, 0x14) 19:59:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:39 executing program 0: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) connect(r0, &(0x7f00000000c0)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x120) ioctl$DRM_IOCTL_MODE_CURSOR(r4, 0xc01c64a3, &(0x7f0000000080)={0x31dcfcc3452af188, 0x0, 0x0, 0x800, 0x0, 0x0, 0x5}) 19:59:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000e86000), 0x0) geteuid() r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e61, 0x8001, @empty, 0x1}, {0xa, 0x4e21, 0x1000ddf3, @rand_addr="a2dcfdf0671c0df10d250b0bba6f9ec1"}, r1, 0x9}}, 0x48) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2710, @host}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="ff02003170f5b1ea4ad1e814fc9a1668d77900000000000000000000000001000004d232000000000008000000000000000000000000000400000000000000ffffff7f00000000bf03000000000000090000000000000007000080000000000700000400000000"], 0x2}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x5}, @IFLA_BOND_PRIMARY={0x8}]}}}]}, 0x44}}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) 19:59:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:40 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f0000000040)={0x1, 0x8, 0x1, 'queue1\x00', 0x55}) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) splice(r4, 0x0, r0, 0x0, 0x6, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x5}, @IFLA_BOND_PRIMARY={0x8}]}}}]}, 0x44}}, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r5, 0x400442c9, &(0x7f0000000540)={0x100, @random="395d29386c0f"}) write$FUSE_DIRENTPLUS(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="9002000000000000010000000000000007000000000800"/124, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000017e70100000000000066642f3400a724bf056cb809d006ae0886246456924d25fd29306d365a05aea70d4d0870a6518731429733fe0512f3d43936f91a4d36b27cc505bce73167e43c26d2d867b6a255ae9a1746a57869e85fa852966499f65f45d08f3ca83430d684d017af5027dc7b089400592b184e5cc91f07f9581235b9d6bf1a345610a65571ce4eeba84db23fdafbb19d94134fabdec0748c2229057e0fb8f3f664beadee22aa9105cb39411a8d269e81cf9e5776548abf6c8a8325ec94fd90ebb3a3a89090dbc258f438d1834575e563d7b77165abaeef2a9e95dea08934725b5cc43fb7cf6fdbbe52c5bcb334be7df76e2f347dbc2e74941c25cb93ea22416128d64658d808d1104e7be8bc29c81e36ff95a35b84f4a5e866c2401f3768b3d6ab9a03953e565cc42554944dc76083a1a0c8676ee3feef5bb3bd18521b3dab972403aa84430e5744ee61f5b982eabd353a22f6662fa18f2538a81ecfb6a7e11b3194c147f9fcc7371c002f1c1931b74f24813f8189896b44915f493f5d651198447a11d3e06a4795872a6a6efc755cef5e6c74d3297c40dfa529b95eb46814a1cdac3e48e845431389763b1c029f6c851b829adca08e6c2e6ecb7d15318ae5e7d054cbddb6532f8eff35899c81c5fbb1b66bd835c21d1a0b07a7cd5cd716b2e21184b8775142ac1fbde0e67b00"], 0x290) r6 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x5}, @IFLA_BOND_PRIMARY={0x8}]}}}]}, 0x44}}, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={0x0, 0x8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r6, 0x84, 0x5, &(0x7f0000000480)={r7, @in={{0x2, 0x4e22, @broadcast}}}, 0x84) r8 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x5}, @IFLA_BOND_PRIMARY={0x8}]}}}]}, 0x44}}, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000580)={r7, 0x5, 0x62e3, 0x10000000, 0x8, 0x800}, 0x14) 19:59:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x20}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000006900)=[{{&(0x7f0000000380)=@hci, 0x80, 0x0, 0x0, &(0x7f0000000b80)=""/235, 0xeb}, 0x7}, {{&(0x7f0000000c80)=@caif, 0x80, 0x0}, 0x9}], 0x2, 0x40000001, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x1a7) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x4, 0x4, 0x0, 0x0, 0x0, 0x5, 0x104402, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x2000, 0x9, 0x1, 0x0, 0xb, 0x7, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x884}, 0x4000) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg$inet(r4, &(0x7f00000010c0)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @initdev}, 0x10, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000ff06004a60ebef2c478a8eecec9c4c7c70e96d508f07fe3b04dc8cb2acd37913b1f73ab71d6dc45954a820578774820900000000cfc613d12adb64fe868b17ee10d2d60389910a0000000000000491e76079b7e99a6e319aad462f9691ba629a777fb5d0a0583b7ec4e36f08d215c2de6770338786a729bee41e9ec39b4bc291b928ef9f1b12e68f74ab829bfab487da47081184bf0d92f72e5660b42e5eafe40debd93f5c8843542ce849e072511884b5cea7960e7ccd81b56a7ae49a9d9c05298ef7f9267d128ce11df000d9fa45e8a8dcbd98d41df16b4ebd66464d1e7f66e11a5463afc56cd9c3ffa277233a378e5cbdf9d18aa6a0eee8e60f2627681241231afcffab6b767130120b75215596d1bc4fb6849874fabbd14fdf723522e65fa0c1c159ae249d711fef8d101b737b6dd68457b0b8a03cdd0c734ce4e7aab97628569897d804986838614b32e2eb83b4cd080277abb4862824672d7ef659a3c2b217d76be42e595d751d8cde26cecba021e62788d513015900953b245c3db57fd510dffc9516e6456c9560e298785fe0f90e01c5c5722ea99cfcd862f8561477dd6cb84a530b24204ee593370bf6b862765e1c604f179187f6113b179ca48735a2c9a8f3ecfcdc91fc1b4dc2394b3dc3bf92bcc2f3e53a8de5e39f2c422ab96e5eddb34bdbf6b5ca86337df66860d676291401568892c3d6e6155ca6a0aebd1c5f07496375a81ac91f0c7378d1d8a9d4799276e2fad34441a878a482ae7074857bd102200aa542998df2"], 0x18}}], 0x1b1, 0x0) socket$inet(0x2, 0x1, 0x9) r5 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000100)={0x0, 'veth1_vlan\x00'}, 0x18) 19:59:42 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000002000000000000004500fce300000000002f9078ac1e0001e000000100008864", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="500000003acec12a"], 0xfdef) 19:59:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)=@flushpolicy={0xd8, 0x1d, 0x10, 0x70bd29, 0x25dfdbfc, "", [@algo_auth_trunc={0xc6, 0x14, {{'sha384-ce\x00'}, 0x3d0, 0x100, "52d100daa627671fd1c678be84906cceda602ebf1e6010143d0229a8fb7322af76c5876b5bb44a32a7a5b165f28e4ca3e0be1dbaeacc96ad13a241adeef4781d10b8b0597dee7376dbc7268508ff4122247b6eb92bf798c82306f7aaef3d1c51cad8426f21b0d40acb688ef0bd6acc9c698cadd6ccc94b3b0720"}}]}, 0xd8}, 0x1, 0x0, 0x0, 0x850}, 0x84) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x14c, 0x10, 0x713, 0x0, 0x0, {{@in=@local, @in6=@mcast2}, {@in6=@dev, 0x0, 0x32}, @in=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @coaddr={0x14, 0xe, @in=@multicast2}]}, 0x14c}}, 0x0) 19:59:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0xfe6f) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000001300)={0x0, r2, 0x3, 0x9, 0x8}) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000080)={0x3c0000, 0x1000, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x980920, 0x1, [], @ptr=0xd7}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r4, 0x80e85411, &(0x7f0000000100)) 19:59:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 19:59:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:44 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x80) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000000c0)) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000240)='./bus\x00', 0x105010, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8)=0xe00, 0x8000fffffffe) 19:59:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 19:59:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 19:59:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) [ 586.753167] ptrace attach of ""[9064] was attempted by "/root/syz-executor.1"[9069] [ 586.755200] audit: type=1804 audit(1585943984.280:51): pid=9062 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir605967334/syzkaller.0V2Vpu/628/file0/bus" dev="loop5" ino=133 res=1 19:59:44 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mlockall(0x1) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0xa800, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r2, 0x65, 0x2, &(0x7f0000000140), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r4, 0x7, &(0x7f0000000100)={0x0, 0x3, 0x976, 0x5}) fcntl$lock(r4, 0x26, &(0x7f0000000180)={0x40001}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:59:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r1, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) [ 586.916788] ptrace attach of ""[9078] was attempted by "/root/syz-executor.1"[9082] [ 586.943386] audit: type=1800 audit(1585943984.320:52): pid=9062 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="bus" dev="loop5" ino=133 res=0 [ 586.984484] audit: type=1804 audit(1585943984.450:53): pid=9073 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir605967334/syzkaller.0V2Vpu/628/file0/bus" dev="loop5" ino=133 res=1 [ 587.031391] audit: type=1800 audit(1585943984.450:54): pid=9073 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="bus" dev="loop5" ino=133 res=0 19:59:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:44 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x18040, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ecf0829800002665f30f008f6300a6af02660f3a62227d0f20e06635000040000f221a260f0350000f01cf", 0x2e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE(r5, 0x80084504, &(0x7f0000000440)=""/4096) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x10200, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000080)=""/30) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x1ff, 0x7e, 0x402, 0x8, 0x200000200, 0x4000000, 0x40004c9, 0x0, 0x100000001, 0x2, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x69c7], 0x100000, 0x80}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:59:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:45 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r1, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 19:59:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:45 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r1, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 19:59:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r1, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 19:59:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:46 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:46 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:46 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:46 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:47 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:48 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:48 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) socket$netlink(0x10, 0x3, 0x0) setreuid(0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x9800, &(0x7f0000000240)=ANY=[@ANYBLOB="662c0de66f21036d209838cca19b743d", @ANYRESHEX, @ANYBLOB="2c722f6f746d6f64653d3085feb636086e619c303030303034303030303030303030302032303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303366662c6d61785f726561643d3078303030303030303030303030303030352c726f6f74636f6e746578743d726f6f742c736d61636b66736861743d2f5b24b62c7065726d69745f646972656374696f2c646566636f6e746578743d73797374656d5f752c7365636c6162656c2c7569643e", @ANYRESDEC=r4, @ANYBLOB=',dont_measure,uid<', @ANYRESDEC=r6, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000100)=0x0, &(0x7f0000000140)) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f00000003c0)={0x200, 0x0, 0x0, 0x9}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="f001000000000000020000000000000003000000000000000300000000000000fcffffffffffffff080000000000000033030000f7ffffff060000000000000009000000000000808000000000000000cd0f00000000000008000000000000000000000000000000f8fffffff72c000000000000fcffffff06000000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="08000000020000000000000000000000000000000400000000000000000000000400000006000000000000000100000000000000000100000000000008000000000000000100008003000000060000000000000005000000000000000500000000000000810000000000000004000000000000000000000000000000d3000000b30a00003eea0000ff07000005000000", @ANYRES32=r7, @ANYRES32=r2, @ANYBLOB="04000000050000000000000001000000000000000300000000000000080000000300000070707030707070300000000000000000000000000000000009000000000000000400000000000000000000000200000006000000000000000100000000000000ff0100000000000001040000000000007e000000000000000500000000000000020000001f000000070000000600000002000000", @ANYRES32=r6, @ANYRES32=r5, @ANYBLOB="000000400080000000000000000000000000000001000000000000009a333357214de9fe1b63cd9543b50a00000003000000646566636f6e74657874000000000000"], 0x1f0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0xe99}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000080)={0x0, 0xff3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160b005b0010000000000004140e000a0002000000dc2976d153b4", 0x235}], 0x1}, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 19:59:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:49 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:49 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:49 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:49 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) socket$netlink(0x10, 0x3, 0x0) setreuid(0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x9800, &(0x7f0000000240)=ANY=[@ANYBLOB="662c0de66f21036d209838cca19b743d", @ANYRESHEX, @ANYBLOB="2c722f6f746d6f64653d3085feb636086e619c303030303034303030303030303030302032303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303366662c6d61785f726561643d3078303030303030303030303030303030352c726f6f74636f6e746578743d726f6f742c736d61636b66736861743d2f5b24b62c7065726d69745f646972656374696f2c646566636f6e746578743d73797374656d5f752c7365636c6162656c2c7569643e", @ANYRESDEC=r4, @ANYBLOB=',dont_measure,uid<', @ANYRESDEC=r6, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000100)=0x0, &(0x7f0000000140)) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f00000003c0)={0x200, 0x0, 0x0, 0x9}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="f001000000000000020000000000000003000000000000000300000000000000fcffffffffffffff080000000000000033030000f7ffffff060000000000000009000000000000808000000000000000cd0f00000000000008000000000000000000000000000000f8fffffff72c000000000000fcffffff06000000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="08000000020000000000000000000000000000000400000000000000000000000400000006000000000000000100000000000000000100000000000008000000000000000100008003000000060000000000000005000000000000000500000000000000810000000000000004000000000000000000000000000000d3000000b30a00003eea0000ff07000005000000", @ANYRES32=r7, @ANYRES32=r2, @ANYBLOB="04000000050000000000000001000000000000000300000000000000080000000300000070707030707070300000000000000000000000000000000009000000000000000400000000000000000000000200000006000000000000000100000000000000ff0100000000000001040000000000007e000000000000000500000000000000020000001f000000070000000600000002000000", @ANYRES32=r6, @ANYRES32=r5, @ANYBLOB="000000400080000000000000000000000000000001000000000000009a333357214de9fe1b63cd9543b50a00000003000000646566636f6e74657874000000000000"], 0x1f0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0xe99}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000080)={0x0, 0xff3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160b005b0010000000000004140e000a0002000000dc2976d153b4", 0x235}], 0x1}, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 19:59:50 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:50 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:50 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:50 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:51 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:51 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:52 executing program 2: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() timer_create(0x6, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000001280)={0x3, 0x8, 0x4, 0x2000, 0x4, {0x77359400}, {0x1, 0x0, 0x0, 0x3f, 0x6, 0x0, "4ce4b56f"}, 0x3, 0x4, @planes=&(0x7f0000001180)={0x9, 0x5, @mem_offset=0x3, 0x3}, 0x400}) clock_gettime(0x0, &(0x7f0000001300)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) rt_sigtimedwait(&(0x7f0000000040)={[0xfffffffffffeffff]}, 0x0, 0x0, 0x8) r5 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001080)=ANY=[@ANYBLOB="440000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e640000000014000280050001000500000008000b00", @ANYRES16, @ANYBLOB="e0d868c9"], 0x5}}, 0x0) r6 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(r0, r6, 0x13, &(0x7f0000001200)={0x3e, 0x4}) r7 = add_key(&(0x7f0000001100)='cifs.idmap\x00', &(0x7f0000001140)={'syz', 0x2}, &(0x7f00000013c0)="a89adc000000000000000000", 0xc, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r7, &(0x7f00000011c0)='ceph\x00', 0x0) read$alg(r5, &(0x7f0000000080)=""/4096, 0x1000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001700)={&(0x7f0000001400)={0xa4, 0x0, 0x10, 0x70bd2d, 0x25dfdbee, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x10}, 0x84) timer_settime(r1, 0x0, &(0x7f000004a000)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) 19:59:52 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:52 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:53 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:53 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x6, 0x7) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) openat(r3, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000340)={0xfffffdfe, 0x0, [], {0x0, @bt={0x0, 0x3c, 0x0, 0x0, 0x5, 0x5, 0x3, 0x6f, 0x6, 0x400, 0x9, 0x1, 0x0, 0xffffffff, 0x19, 0x20, {0x8, 0x7}, 0x9, 0xfe}}}) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x0, &(0x7f00000008c0)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x20, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="7f00828770929871c79e07847f66d5adb11e686f9a44b54fee2e2db1e8890df3baa43ac96b91926d4424c93b977d0b", @ANYRES16=0x0, @ANYBLOB="0004000000000000000001000000080004008542377d"], 0x1c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) sched_yield() socket$key(0xf, 0x3, 0x2) add_key(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r6, 0xc0045005, &(0x7f0000000000)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r7, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:59:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:53 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x20, 0x3, 0x1, 0x8000000, 0x3, 0x0, 0x200}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x159) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f00000001c0)={&(0x7f00000002c0)=@ipx={0x4, 0x9, 0x5, "ffde876c9087", 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000340)="b5154684b9887531b488a6d2a04e2fcc3c94e1b692d6b16c29912bdf810a3d2d0fce7fb909f453aaf40e6a8400f66c996d9b205e11212b2c7c85c26c564485eff327bd82f4ef8b5df725035c739c625e8afe126a1e0330a0c98479daf1b292c60d19e755d12214e9dd4a0c7eefd8536ef7e7f5e09cfd289c8e7d3120f919b05b77cb2b4fe3ea176dcf3a599f21021a9f897dc0b5b588f35000f46fef462e4e8fb113aee6cd503e7634d400c02913e449fdfe7c5c54f5a2a60f249e4d0a75ee2cfcf8802c44956749ae5fc502653fd328f7be61a06651387b9d68805bb56007", 0xdf}], 0x1, &(0x7f0000000440)=[{0xb8, 0x29, 0x3, "1df8d87b414b6fa15c855f622220081cab720977980569a806e6049b33ffbe097940cc392eb7c53004a64a056d7f41605d46c248a02c27d461febae45df1412f9b707c1ea625c6991e8ee02b5daea527cd0804097ee543a1809e9a666fa01d6c32ac252f8aac372c5e70e80188f123f569e2f466b032b7a754043d4c910ffb5291a506ea4c7375a1e614d6fa007f09566ea8007c387bc9cd4e6ea56571d0ea06a08e4c"}, {0x1010, 0x6, 0x8000000, "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"}], 0x10c8}, 0x8014) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000100)={0x9, 0x7ff, 0x1}) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6d18af15637eebe9}, 0x8000000200036150, 0x800007b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='exfat\x00', 0x4, &(0x7f00000000c0)) fcntl$getown(0xffffffffffffffff, 0x9) 19:59:54 executing program 2: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() timer_create(0x6, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000001280)={0x3, 0x8, 0x4, 0x2000, 0x4, {0x77359400}, {0x1, 0x0, 0x0, 0x3f, 0x6, 0x0, "4ce4b56f"}, 0x3, 0x4, @planes=&(0x7f0000001180)={0x9, 0x5, @mem_offset=0x3, 0x3}, 0x400}) clock_gettime(0x0, &(0x7f0000001300)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) rt_sigtimedwait(&(0x7f0000000040)={[0xfffffffffffeffff]}, 0x0, 0x0, 0x8) r5 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001080)=ANY=[@ANYBLOB="440000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e640000000014000280050001000500000008000b00", @ANYRES16, @ANYBLOB="e0d868c9"], 0x5}}, 0x0) r6 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(r0, r6, 0x13, &(0x7f0000001200)={0x3e, 0x4}) r7 = add_key(&(0x7f0000001100)='cifs.idmap\x00', &(0x7f0000001140)={'syz', 0x2}, &(0x7f00000013c0)="a89adc000000000000000000", 0xc, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r7, &(0x7f00000011c0)='ceph\x00', 0x0) read$alg(r5, &(0x7f0000000080)=""/4096, 0x1000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001700)={&(0x7f0000001400)={0xa4, 0x0, 0x10, 0x70bd2d, 0x25dfdbee, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x10}, 0x84) timer_settime(r1, 0x0, &(0x7f000004a000)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) 19:59:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:54 executing program 0: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() timer_create(0x6, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000001280)={0x3, 0x8, 0x4, 0x2000, 0x4, {0x77359400}, {0x1, 0x0, 0x0, 0x3f, 0x6, 0x0, "4ce4b56f"}, 0x3, 0x4, @planes=&(0x7f0000001180)={0x9, 0x5, @mem_offset=0x3, 0x3}, 0x400}) clock_gettime(0x0, &(0x7f0000001300)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) rt_sigtimedwait(&(0x7f0000000040)={[0xfffffffffffeffff]}, 0x0, 0x0, 0x8) r5 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001080)=ANY=[@ANYBLOB="440000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e640000000014000280050001000500000008000b00", @ANYRES16, @ANYBLOB="e0d868c9"], 0x5}}, 0x0) r6 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(r0, r6, 0x13, &(0x7f0000001200)={0x3e, 0x4}) r7 = add_key(&(0x7f0000001100)='cifs.idmap\x00', &(0x7f0000001140)={'syz', 0x2}, &(0x7f00000013c0)="a89adc000000000000000000", 0xc, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r7, &(0x7f00000011c0)='ceph\x00', 0x0) read$alg(r5, &(0x7f0000000080)=""/4096, 0x1000) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001700)={&(0x7f0000001400)={0xa4, 0x0, 0x10, 0x70bd2d, 0x25dfdbee, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x10}, 0x84) timer_settime(r1, 0x0, &(0x7f000004a000)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) 19:59:54 executing program 5: mkdir(&(0x7f0000000740)='./file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$unix(r1, &(0x7f0000000300)=@abs={0x0, 0x0, 0x4e22}, 0x6e) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x80, 0x4, 0x6, 0x801, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x400c890) 19:59:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000600000004000000e803000000000000500100000000000050010000480200001803000018030000180300001803000018030000040000000000000000000000fe800000000000000000000000000040fe880000000000000000000000000001270248d3ec613c0b000000000000000000000000000000000000000000000000626f6e645f736c6176655f3100000000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280150010000000000000000000000000000000000000000000000003800636f6e6e6279746573000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000480064737400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff7f0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000faffffffffffff7565746830000000000000000000000000000000000000000000000000000000006d7d9c9f1b8e047700000000000000000000000000000000000000d000f80000000000000000000000000000000000000000000000000028007365740000000000000000000000000000000000000000000000000000010000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe880000000000000000000000000001fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000040000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000"], 0x1) ptrace$setopts(0x4206, r0, 0xc3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) pipe2(&(0x7f0000000540), 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r6, 0x4008af12, &(0x7f0000000500)={0x1, 0xffff}) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000000)={r8}, 0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000480)={r8, 0x8000, 0x6abd, 0x5, 0x80, 0x2}, 0x14) tkill(r0, 0x1e) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 597.166272] overlayfs: filesystem on './file0' not supported as upperdir [ 597.176837] overlayfs: upperdir is in-use by another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 597.190957] overlayfs: filesystem on './file0' not supported as upperdir 19:59:54 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000340)=@v2, 0x14, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)={0x264, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8001}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x10001}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xd42}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdfd5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd7e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x98}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb76e}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6f1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}]}, @TIPC_NLA_BEARER={0x150, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x6, @mcast1, 0x7}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x80000000}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x400, @remote, 0xfffffffa}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x70, @dev={0xfe, 0x80, [], 0x1c}, 0x3}}, {0x14, 0x2, @in={0x2, 0x4e24, @empty}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NODE={0x2c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa5c}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffec1}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6dfe}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb1e4}]}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x264}, 0x1, 0x0, 0x0, 0x4880}, 0x4850) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="01fb560eeb48a80206000000", @ANYRES32=0x0], 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$sock_proto_private(r1, 0x89e8, &(0x7f00000000c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) 19:59:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000}, 0x0, 0x9, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d665203775695ea0b39b103d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3c0100dd09000000603b8f3e24d021af02b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe381b3a6af09ab2c3559c439c6479605528726a068cdc76a22067b3534442da88bc90"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES64, @ANYBLOB="000000000400000008000a00", @ANYRES32, @ANYBLOB="c3f9b52cf6c37e2b289b3a3f000000cff6bc379ddcdf5da799c07ed9b78b98bf94bedbf3369c410b0b3692cdd2abbe02058bd0b9c893790300fe78bf7b9787111d42aa28152284e3ad7ed1d41fe829bdbbb48ef94ea97eb6a749bd8d30dfa5083ef62d3692d17cfd537d0689b4152cb80f4e17a986b250a8526dda97cdfa6b2641e368acc79cd775eeeee2dd4f47c6736a4a26b63222ed0b8dc61800000000000000000000000000001f07a1af9dace601a6ef0ef50713821b40e60b27e2ffab2642e0bfecd8b94645dbe7e79aafb15ff8da0648a939c6ab9acfce929c79b77093e4515b57ce0c00000000000000", @ANYRESHEX=r3], 0x6}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010000b0400008076af43ef4a9a2bcc00", @ANYRES64=r0, @ANYBLOB="00000002000000001c0012000c00010062726964676500000c00020008001900080000001171c3af85b5533192e2ee00708ba2b0739968ef2cc7a442a042ce3d00ba979c6ae0e4e21aa7344d366c959f955a292b9fc3cfca0f931ac46c9930734378998685d86eec682fa4b24e976e683839ddcba91973e24c94d9dc6aed94233f8b34d683b3f51b6cc9864b2c4e59061f1bc093c610ef50a42ed81e9432"], 0x3}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000040)=0x7) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) preadv(r5, &(0x7f0000000280)=[{&(0x7f0000000240)=""/27, 0x1b}], 0x1, 0x2) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00170002000000740004140e00110002000000dc2976d153b4", 0x235}], 0x1}, 0x0) 19:59:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() mlockall(0x1) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x3}, 0x0) getpgid(r4) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x3}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) tkill(r6, 0x4000008) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 19:59:57 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r1, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 19:59:57 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:57 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:58 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000}, 0x0, 0x9, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d665203775695ea0b39b103d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3c0100dd09000000603b8f3e24d021af02b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe381b3a6af09ab2c3559c439c6479605528726a068cdc76a22067b3534442da88bc90"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES64, @ANYBLOB="000000000400000008000a00", @ANYRES32, @ANYBLOB="c3f9b52cf6c37e2b289b3a3f000000cff6bc379ddcdf5da799c07ed9b78b98bf94bedbf3369c410b0b3692cdd2abbe02058bd0b9c893790300fe78bf7b9787111d42aa28152284e3ad7ed1d41fe829bdbbb48ef94ea97eb6a749bd8d30dfa5083ef62d3692d17cfd537d0689b4152cb80f4e17a986b250a8526dda97cdfa6b2641e368acc79cd775eeeee2dd4f47c6736a4a26b63222ed0b8dc61800000000000000000000000000001f07a1af9dace601a6ef0ef50713821b40e60b27e2ffab2642e0bfecd8b94645dbe7e79aafb15ff8da0648a939c6ab9acfce929c79b77093e4515b57ce0c00000000000000", @ANYRESHEX=r3], 0x6}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010000b0400008076af43ef4a9a2bcc00", @ANYRES64=r0, @ANYBLOB="00000002000000001c0012000c00010062726964676500000c00020008001900080000001171c3af85b5533192e2ee00708ba2b0739968ef2cc7a442a042ce3d00ba979c6ae0e4e21aa7344d366c959f955a292b9fc3cfca0f931ac46c9930734378998685d86eec682fa4b24e976e683839ddcba91973e24c94d9dc6aed94233f8b34d683b3f51b6cc9864b2c4e59061f1bc093c610ef50a42ed81e9432"], 0x3}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000040)=0x7) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) preadv(r5, &(0x7f0000000280)=[{&(0x7f0000000240)=""/27, 0x1b}], 0x1, 0x2) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00170002000000740004140e00110002000000dc2976d153b4", 0x235}], 0x1}, 0x0) 19:59:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r1, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 19:59:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:58 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 19:59:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 19:59:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8, 0x4}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0xd}, {0x8, 0xf}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="26f9a73e00b66d277fd9bb82321e256b"}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="8abaf2f5fd2e3917ed47d725c2c48753"}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) 19:59:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) 19:59:59 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r1, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 19:59:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) 20:00:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002b00)=[{{&(0x7f0000000300)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)=""/26, 0x1a}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x2, &(0x7f00000014c0)=""/4096, 0x1000}, 0xfffffffa}, {{&(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000400)=""/35, 0x23}], 0x1, &(0x7f00000024c0)=""/31, 0x1f}, 0x300}, {{&(0x7f0000002500)=@xdp, 0x80, &(0x7f0000002900)=[{&(0x7f0000002580)=""/203, 0xcb}, {&(0x7f0000002680)=""/56, 0x38}, {&(0x7f00000026c0)=""/7, 0x7}, {&(0x7f0000002700)=""/189, 0xbd}, {&(0x7f00000027c0)=""/126, 0x7e}, {&(0x7f0000002840)=""/70, 0x46}, {&(0x7f00000028c0)}], 0x7, &(0x7f0000002980)=""/188, 0xbc}, 0x800}], 0x3, 0x0, 0x0) tee(r1, r1, 0x7, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x8000000000001e, 0x5, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8004000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff74}], 0x1, 0x2040000) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f00000000c0)="1aed1087de9a32649778ddfff675f03d70f619d715f0b02ccfc373d831770200c9", 0x21, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r4, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x0, @empty}], 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0xfea, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, @in={0x2, 0x4e22, @remote}], 0x2c) 20:00:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:00 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8, 0x4}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0xd}, {0x8, 0xf}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="26f9a73e00b66d277fd9bb82321e256b"}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="8abaf2f5fd2e3917ed47d725c2c48753"}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) 20:00:00 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8, 0x4}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0xd}, {0x8, 0xf}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="26f9a73e00b66d277fd9bb82321e256b"}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="8abaf2f5fd2e3917ed47d725c2c48753"}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) 20:00:00 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8, 0x4}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0xd}, {0x8, 0xf}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="26f9a73e00b66d277fd9bb82321e256b"}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="8abaf2f5fd2e3917ed47d725c2c48753"}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) 20:00:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8, 0x4}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0xd}, {0x8, 0xf}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="26f9a73e00b66d277fd9bb82321e256b"}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="8abaf2f5fd2e3917ed47d725c2c48753"}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) 20:00:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) 20:00:00 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8, 0x4}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0xd}, {0x8, 0xf}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="26f9a73e00b66d277fd9bb82321e256b"}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="8abaf2f5fd2e3917ed47d725c2c48753"}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) 20:00:02 executing program 1: r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:02 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x4, 0x0, 0x4}}, 0xe8) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="380100001a00010800000000000000007487f654b36e413747e04d6a85aceeb0e3daef21b274a924bab3619673863f5d00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x138}}, 0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x0) 20:00:02 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8, 0x4}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0xd}, {0x8, 0xf}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="26f9a73e00b66d277fd9bb82321e256b"}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="8abaf2f5fd2e3917ed47d725c2c48753"}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) 20:00:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8, 0x4}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0xd}, {0x8, 0xf}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="26f9a73e00b66d277fd9bb82321e256b"}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="8abaf2f5fd2e3917ed47d725c2c48753"}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) 20:00:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x11d000}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) r3 = accept$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @default}, [@netrom, @rose, @default, @rose, @rose, @rose, @default]}, &(0x7f0000000040)=0x48) preadv(r3, &(0x7f0000001840)=[{&(0x7f0000000280)=""/228, 0xe4}, {&(0x7f0000000440)=""/204, 0xcc}, {&(0x7f0000000140)=""/31, 0x1f}, {&(0x7f0000000540)=""/165, 0xa5}, {&(0x7f0000000600)=""/182, 0xb6}, {&(0x7f00000006c0)=""/201, 0xc9}, {&(0x7f0000000380)=""/106, 0x6a}, {&(0x7f00000007c0)=""/119, 0x77}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x9, 0x5) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000080)="f00fab8102000000b8a30000000f23c00f21f835020008000f23f8b8010000000f01c1002b66b8dc008ed0b9800000c00f3235000400000f300f079d0f01735bdb90da000000", 0x46}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001a00)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000040000001a000000"], 0x14}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x7, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x50}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001980)={&(0x7f0000001940)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="001c2abd7000fcdbdf251800000008000300", @ANYRES32=r7, @ANYBLOB="0c00990007000000040000000a001a00aaaaaaaaaaaa00000a001a00ffffffffffff0000"], 0x40}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:00:02 executing program 3 (fault-call:17 fault-nth:0): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) [ 604.922273] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 20:00:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8, 0x4}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0xd}, {0x8, 0xf}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="26f9a73e00b66d277fd9bb82321e256b"}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr="8abaf2f5fd2e3917ed47d725c2c48753"}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) [ 605.036919] FAULT_INJECTION: forcing a failure. [ 605.036919] name failslab, interval 1, probability 0, space 0, times 0 [ 605.048309] CPU: 0 PID: 9956 Comm: syz-executor.3 Not tainted 4.14.175-syzkaller #0 [ 605.056129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 605.065490] Call Trace: [ 605.068100] dump_stack+0x13e/0x194 [ 605.071750] should_fail.cold+0x10a/0x14b [ 605.075925] should_failslab+0xd6/0x130 [ 605.079919] __kmalloc_track_caller+0x2e1/0x7b0 [ 605.084603] ? strndup_user+0x5b/0xf0 [ 605.088423] ? wait_for_completion+0x390/0x390 [ 605.093018] ? vfs_write+0xff/0x4e0 [ 605.096659] memdup_user+0x22/0xa0 [ 605.100213] strndup_user+0x5b/0xf0 [ 605.103851] ? copy_mnt_ns+0x8a0/0x8a0 [ 605.107747] SyS_mount+0x39/0x120 [ 605.111215] ? copy_mnt_ns+0x8a0/0x8a0 [ 605.115116] do_syscall_64+0x1d5/0x640 [ 605.119018] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 605.124220] RIP: 0033:0x45c849 [ 605.127419] RSP: 002b:00007f1ae01f2c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 20:00:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="bb0e0000000000002800128009000100766c616e0000000018000280fe000100000000000c000200070000000a00000008000500", @ANYRES32=r3, @ANYBLOB], 0x50}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000ec0)="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", 0x1000}, {&(0x7f00000003c0)="04a93ae4c8c90dee59d0c785936d7aefb8c194fd68cc8750de603a6c9b51db33b728e2f19be0", 0x26}, {&(0x7f0000001ec0)="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", 0x1000}], 0x3, &(0x7f0000000440)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @broadcast}}}], 0x20}, 0x20000041) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], 0x1) fchdir(0xffffffffffffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r5) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r8) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x9800, &(0x7f0000000200)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3ff}}, {@max_read={'max_read', 0x3d, 0x5}}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, '/[$\xb6'}}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@seclabel='seclabel'}, {@uid_gt={'uid>', r7}}, {@dont_measure='dont_measure'}, {@uid_lt={'uid<', r8}}]}}) setfsgid(r6) [ 605.135227] RAX: ffffffffffffffda RBX: 00007f1ae01f36d4 RCX: 000000000045c849 [ 605.142509] RDX: 0000000020000940 RSI: 0000000020000000 RDI: 0000000000000000 [ 605.149796] RBP: 000000000076c0e0 R08: 0000000020000140 R09: 0000000000000000 [ 605.157107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 605.164420] R13: 0000000000000752 R14: 00000000004ca0ee R15: 0000000000000000 20:00:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000440)=""/9, 0x9, 0x2, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000300)="03c21790f107d2f313372dc0f1306f00590f0e4f6d3c3d760d154d791d6e27994668a92cec1f9d8e5e9e154309dcaac2c7b6", 0x32}, {&(0x7f00000004c0)="dfb26d60baa4f64f850cb72598d909aac218b32a9bb31e5ea99b79422f15e5fc6081296e729f712b8804000000000000001b43d1090369537b5fece0459af478d6602e37737e9650018fed3fe367308ae7e5a5a909038505e759ee8d0000", 0x5e}], 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000340)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0xfffffffffffffcf9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3300d1", @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x14a) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x20000000000032) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) [ 605.275663] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 605.347826] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 605.366215] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 20:00:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) 20:00:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB="2c726f6f746d6f64653d30d9792de63030303030303030303030303130303030302c757365725f69643dc32ac257ed7025cf6876e653858641a1453438535d9b7eebf717a9104b7222d9b4e090788e79dfdbc126c9b609c5f3c530442873dcbbe1f4a119e65cb20cb0b42bb43caa7c36cdfd8115a443323c7de93f082679d9df46f3d282b4b7eb65a5aad090257f8ae421ea63f00008ae3415e8b1ca0b77e3b23331692f3870d2d50755640d5c9fd8a74c45eb8a1c03be36303d0849455186f3a40e2916986160bdec52507b48273f717914835f0c227a28f79f22a02d83e2765d5b445011aa54726c6bc2", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:05 executing program 1: r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) 20:00:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x4d, &(0x7f0000000040)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:05 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c27bc337600363940ffb4aed12f06000000000000", 0x1b}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000780)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES64=0x0], @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES16=0x0, @ANYRESDEC], @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYBLOB="d64fbfadbce1c456d35b4333fec70c4b4bd425aa97c83b9bb07539f6539bdef5509ac4a3b16075eb14e1bc7d9e0e11e20cd10f11327efac83df76f49d2d24c7e34d1c9452785ca15eec4a6b26b1ad2ab73014523caa45070f26ded49f8c8fca90e7ecb9f95a79aca646dfe067fadbab4fd97185318796595bc6ead55e02db2f9ff1a14c7ea04b3239cb28a", @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESOCT, @ANYRESDEC=r1, @ANYPTR, @ANYPTR64], @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRES64, @ANYPTR, @ANYRES64, @ANYPTR64, @ANYPTR64, @ANYRES16, @ANYPTR, @ANYRESOCT=r1, @ANYRESHEX], @ANYRESDEC, @ANYRES64, @ANYRESOCT=r0], @ANYRES16, @ANYBLOB="c84420fd27c95950698c22a5170540e2de3cf3b44c77ed56ce582a3389cb3e897cb210d784f1bef138e16d340ce79c248bcd77fd7a67968e2184d55eaf8e30d01506d698ed865b99c3e94ea4aa2f737d2c65629109f1a5223cb12c16e7c40d0de580e031f9ab90c6d45dda", @ANYRESDEC, @ANYRES64=r1, @ANYRESDEC], @ANYRES64, @ANYRES32=0x0]], 0x8}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETSW2(r4, 0x402c542c, &(0x7f0000000000)={0x9, 0x9, 0x9, 0xffff, 0x7, "368e7772b355514d42a59c110b6925848ded68", 0x1, 0x9}) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 20:00:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0x980000, 0x2, 0x7f, r0, 0x0, &(0x7f0000000080)={0x990a5f, 0xfffffffe, [], @value=0x20}}) flock(r1, 0x4) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$VIDIOC_G_OUTPUT(r2, 0x8004562e, &(0x7f0000000000)) 20:00:05 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], [], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r0, 0x5502) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x9800, &(0x7f0000000200)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3ff}}, {@max_read={'max_read', 0x3d, 0x5}}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, '/[$\xb6'}}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@seclabel='seclabel'}, {@uid_gt={'uid>'}}, {@dont_measure='dont_measure'}, {@uid_lt={'uid<'}}]}}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x9800, &(0x7f0000000200)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3ff}}, {@max_read={'max_read', 0x3d, 0x5}}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, '/[$\xb6'}}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@seclabel='seclabel'}, {@uid_gt={'uid>'}}, {@dont_measure='dont_measure'}, {@uid_lt={'uid<', r6}}]}}) sendmsg$unix(r2, &(0x7f0000000c80)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000940)=[{&(0x7f00000000c0)="e5dd7bc4611a0f17eebbbe8da97cbdae9af27e91723383b9b4fc3c7238cf9a5bedef410dbd28b861ecfae369d3b5ec9abee7fa8c9b515e66eaac8eabb081a92406", 0x41}, {&(0x7f0000000140)="46472d29b9ac7342ad55b1cba5d02443da7f0fe7ab900cd065b972717fac1492545de3f33bf57842e006ea397b0c0652ffbc614b8474cb94bf4a30f767662d1b82d1710d", 0x44}, {&(0x7f00000001c0)="69b20f2075463de0a726c03351f0cd1fcf7740d9d69c8031735d4af26a330b877e1ac618fd6c7fe3fdf8cae0961c18abb0ffaac084fb8898d3bc3bf947d858e2dcc47fd0814a465f14b747fc63b48096c964e5d1c111c4ea992be8864cd2a61fdf0fa43600ccdc3f8cfec626e5b66e3c972695dd57009ba2e42c3534c367d698fccceda34893809762022acee2d264fc82e67bb7115ace50b09f3a196fdf0387519a84033f4c58238c9114f0a271705ea5429fb68319291aa4a6393861db31d3d811734ca2f1703f31444682d664700d4b759e0eab54ee385f7b49c81077ce8613e7c5ebd8fa05a63254ed0eab54cc6e4856fdebd0", 0xf5}, {&(0x7f00000002c0)="e0d384b30e218eb9e6c0833386759140713c8c72be5af6383b0a36e7624ba9676f6918fd773c1110fb88ad7a002421cb682b13b9e8036e695c07883f6567743bc8c6da4436d546526faa80aee1efce1b4860", 0x52}, {&(0x7f0000000340)="8c002ce7ba4c8e08bd6921e0a13aa112a494aa046e68a266ea8545bc98f1e4ed31d553c6303aab8aab70f39ff3574765d580ad65cc5266d2c5403c24", 0x3c}, {&(0x7f0000000380)="cc65372ceff038905b5559080805824e55cf541baed8c9d491c09b5bc3491bc68bf3f918da5a0406dfead5cf2e77405e6bacf57df573c70fa59202f58d5ddd34bfdc4d2848c7e1b5317f6c34a14c535e719123fdb6c7334da89dd37fab93fe037d0db340bfe38220d8c83c12635a0d4efaa6373542fe4397aab8992aed3132ea", 0x80}, {&(0x7f0000000880)="3a69676aa83abe68d686b96ab62c6bcd39e690bc018c3370ed42ee7800a90849e175b5fb1ff9ad39b320c60e06f4dd7bb14963f2c2bb716ec73a842825c8aba1da11badb7716481dea9e19d2ef2880826adef6dac1d5459d1148a1d58b92e0c4642145483f3fe71bf9a3078a5b18f9b8546d8c4838180a8f6dec6ad4ed637e8131ad0f8cd7625a5e14f960ea5c59254814f16fc0b9daa2b56ebf4f01e503d6651e8093aa8ae656aa3486abd067993112", 0xb0}], 0x7, &(0x7f0000000b80)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r5}}}], 0xc8, 0x8810}, 0x8d4) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x2f2) 20:00:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x200000201, 0x0, 0x4c8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="01000000000000000000010000004a21050004000100"], 0x1c}}, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r4, 0xe7a035cf4856fee5}, 0x14}}, 0x0) 20:00:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) [ 607.985067] input: syz1 as /devices/virtual/input/input7 20:00:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) 20:00:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=01000000000000000100000,user_id=', @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYBLOB="32aaf6989e778114af426266ec5c1d4774b4c3e190117b5a1c874a24115ea9e6d8ee1a3f0fee8cbd3c6dd177d7402b434fbffcb88956c08b037542a43677713b189f4d9d6ee4a062a8cf29f9aa811224e23fd1f4039a78799d079889bab65ee6949e81f999c5d47c4f45e8c4c36c2e8c0f3e6c13a3df1a0a63cedfea3313c9a9abb9e2c81fad7ac89455c068fd", @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES32]], @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) [ 608.174053] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 608.182382] input: syz1 as /devices/virtual/input/input9 20:00:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) 20:00:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) [ 608.261845] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 609.694625] NOHZ: local_softirq_pending 08 20:00:08 executing program 1: r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643db6c73d2b424c368ca4a461ce288753f2093bab2a7dda564e9537441a869f87aa2ae40c5671707ea0a6ff565a10bd20877638c82f75beca3b7d80bd0fb69d292876d3b6cf234fd19de5b2d80400400e6d5d1f22c1500a38cdf9cfb5655a43645eecebb4e1582cd75c4a35dd5491ebb423d09c6645569755551ea3a324cd000000000000003813f37af4231b068a4680e0b79a6236bbee3f8d35892a987d94ba8bf2532a1c2e8cfd3cde7b253a50f8b32aae057cfff9b49e2288fa1479ad74670aca4612d44f1818a0e711c2501dae6a7075b366a13065b087b1c3c1826284428dc8914f1d8fdd5009bfb9b100"/260, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='-!']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x200000201, 0x0, 0x4c8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="01000000000000000000010000004a21050004000100"], 0x1c}}, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r4, 0xe7a035cf4856fee5}, 0x14}}, 0x0) 20:00:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x4d, &(0x7f0000000040)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:08 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @empty}}, 0x24) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 20:00:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$netlink(0x10, 0x3, 0x0) 20:00:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$netlink(0x10, 0x3, 0x0) 20:00:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="f8726f6f746d6f64653d3030303030303030ade7000000000000303030303030302c757365724569643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@uid_lt={'uid<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x61, 0x39, 0x36, 0x37, 0x33, 0x33, 0x35], 0x2d, [0x30, 0x33, 0x33, 0x61], 0x2d, [0x34, 0x33, 0x63, 0x39], 0x2d, [0x32, 0x64, 0x65, 0x31], 0x2d, [0x38, 0x65, 0xc67d2520ba469ff7, 0x36, 0x0, 0x35, 0x62, 0x66]}}}, {@smackfsroot={'smackfsroot'}}, {@dont_hash='dont_hash'}, {@measure='measure'}, {@uid_eq={'uid'}}]}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:08 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @empty}}, 0x24) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 20:00:08 executing program 5: r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) [ 611.334278] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 20:00:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:08 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0xa) close(r2) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) ioctl$void(r3, 0xc0045878) socket(0x10, 0x3, 0x6) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast1, @in6=@loopback}, {@in6=@ipv4={[0xfffffff0], [], @dev}}, @in6=@rand_addr="a3f8278884164cd6f6e7733584da1426", {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x1, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000100)={0x4000000, 0x2, 0x26}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 612.255207] NOHZ: local_softirq_pending 08 [ 612.259493] NOHZ: local_softirq_pending 08 20:00:11 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ttyS3\x00', 0x240800, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x1b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000040)) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x5, 0x3, 0x3f, 0x3ff}, {0xcd, 0xfa, 0x40, 0x2d}, {0x401, 0x3f, 0xc, 0x6}, {0x9, 0x1, 0xd6, 0x865a}, {0x0, 0xfa, 0x7, 0xffffffe0}]}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ttyS3\x00', 0x0, 0x0) 20:00:11 executing program 0: write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/consoles\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r3, 0x0, 0x4) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f00000000c0)) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r4, 0x0, 0x4) ioctl$USBDEVFS_REAPURB(r4, 0x4008550c, &(0x7f0000000080)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000000)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, 0x7, 0xffffffff, 0x5, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) 20:00:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="ad87f3fbf987e249f400f6ca8f647ed13341b847921d00000000000000072a05e09a41423e3aee251a0902d8db54cd8dcd864381088abdd22f1f4f13b0aacbd89d0203bb"]) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) 20:00:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x2) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) pipe(&(0x7f0000000780)={0xffffffffffffffff}) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f00000009c0)) syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000140)='.//ile0\x00', 0x158, 0x7, &(0x7f0000000a00)=[{&(0x7f0000000480)="90e970aea5257bf8250a957a4830d66151a43079cfaa4ff4a21e641384f763bbbeb06a5eae480de0db7cbaa576ce3bb291ac3c26836a5f751b2e36fb92bd61dd15e5d5c5727075b6e47796dc1a19d9dc249bbcd12e5fef7c2d4ebbf7ec8ba8ce218aa5f200626bec81e8e4e272d87dcbf4f3384d423e5fa907a7780ee2a23574bf0cb697a03c6030d25064a7c82b58904d1c9e00c29215af2282599ac7742faa1006eae0328f071da1907525b1fb850d25226512021225af295cc7ed4a1f9b2fa8a34e70baf15537f065b594e479922f3dfff22b35234ca2e990ceccf43fa68632947dd546fdc2e85f48d718f35c2ed5e4", 0xf1, 0x2}, {&(0x7f0000000240)="ee206190f830ed582684e5c5d1d707881f2001bcdfd719ba9dc53caf2afdc9cc1b38129cd73b25812541234a4d17dd54a0cb3d6e4f386c42b0d484f3730c6db5a4f86349d8bc9a0adf49a94eea7376", 0x4f, 0x9}, {&(0x7f0000000580)="9c79cf1d2b3097932d1dd653207486793e74aaed9bcfa90e049e4d47f6af718e60e606ec017550b8dc3c505edd65d7fcf6dfd80fc17a8115380e915d47ad646975c6ef24e30a281145d0cdba3721ff957aa0ca5e2c9e39a7c5925fceecb1c2cf5ef2495ea9287d95813c4546fdddd761d333e6794f5a2c4841bf757a611b2ca9276766fb971a84f78a1300c58dbc1d9bf0f71fa9b29f29c65e26a5d13a0b5100b73fe476feff4a635f726284af4ddf704f97387d6026840dddf64d9668f4a844cf1bc6e01e58ba51da11c8ba7c24a93057780215", 0xd4, 0x2}, {&(0x7f0000000680)="023b7e4ddf435b4ee5e7ed537c29af7fa3bc402d4f6b1acc868e50b71357fc8611dda410371ab964cef8958e8c4b1505015a222740c62d6240ccd056138c53286bce68a45ddb9019db666b7af902a7bcb25a7ba7d44a1e96714bafbd5e99b7b90b04533312ae888c153644e4e08b533dc759d96ac5478aacc4e9567a9dc729476397523bd8729e3c862f5afe2824f3e11bc6d93c6b9d7f7cee51a98ae8820225292970b5552cc7261ec692998bf24966ee8943bd611de7731d933757e4275d64656d55e7752b3d13beaa74323e7681a9fe", 0xd1, 0xfffffffffffff800}, {&(0x7f0000000180)="8e52800002d7aa6049657e75b99e906238a9bd06521583b314437477be1551d94a1089cb767e4f619e3c609477f44012b3", 0x31, 0x80000000}, {&(0x7f00000007c0)="6576efccba2eeb166488f856bbb09d5c2550ecb70555a9cf62451de7a1d5d5fd8f403d4994ca6c96146a3506be3afa41fb63f39feff6cd1fdfa88c3b07a5a4c9de00d13d25b382574da372fa20aab31416faf21a64bebc2a143db01d55dc10cd1c8ed1356420b85b1aa3185cb0eaae073e16a7d7f580eaa8bb9e7d67d71ecb7a4d1d8bd856d96903c7723ad8ca37689c51a46c7d64a1626725d361028f006cab3505d7e79847a7d19a83a6ad9bedad32280c0b5728bb489cb5f5189c866deb6116f59c405ce31cf7d1d55096af2ed1de73f426eff7d5c7108fc64700b582c21c9864ee08f9bcab79683380b431af5c3cabda7356", 0xf4, 0x1}, {&(0x7f00000008c0)="043a6cfc8e337f3e29946ad812075cf5c6ab202f74344aeceecb05914a88c60da7a49b20edf35ecd4cdd896286c5b0db85dc4a1aa51955215ca24e1c46a7dd25b22a676b51b9fe79cf2f830a081bb1aac7b95584e8242de5b92a7930ab06cc472e3b4efa1f2ee381816b1cd213279a4e8dc165132a87815dcacaf2ad03701fa5727fd82b7434a15774a84b9377fce4094b", 0x91, 0x8000}], 0x22005c, &(0x7f0000000ac0)='posix_acl_accessnodevposix_acl_accesswlan0@[,vboxnet0securityem0self]\x00') mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="757070726469723d2e2f66696c65302c6c6f7765726469723d2e3a66696c65302c7790726b648072312f66696c6531"]) mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x1f) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x29) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e21, 0xd997, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xb6e}, {0xa, 0x4e22, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x101, 0x0, 0x1, 0x9, 0x2]}, 0x5c) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000000)={r4}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000380)={r4, @in={{0x2, 0x4e20, @multicast2}}, 0xffff, 0x3f, 0xd5, 0x4, 0x80000001}, &(0x7f0000000040)=0x98) 20:00:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x2, &(0x7f0000000500)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000300)="7a8814b9850568e6574c2f7448d34837a33a42c91c22e2f32d24e09df0c731f15119980c77e743950d1d7fd8ab5abfd94148427d5edbabe6c93d7dc80ffa60f0991476a6ea40c123564232b4a1f23e6ba4c09889c90bfb14ecbce2f749c162f8c03b2402e130e084a37214db1d88ce35539ffcd800c0ccfa6999adfaf4bb6d", 0x7f, 0xffffffffffffffc0, 0x0, 0x4}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0xd, 0x81, 0xffffffffffffffff, &(0x7f0000000780)="02e23628b4367388aee9d8989da787c86b20f8a10911b832b59e37bbd9714cc635e76aae19a28f768ee3ed2fe46088cf6e15c455399fe5d5070d338a1b7862fee266b047e33871e6037961ec045382ba2e3cd986b346960851b4e6c1ff4eb2d3f7226f406ca7", 0x66, 0x101, 0x0, 0x3}]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d774f2a6fd2b5baa15ecd27912c66bbe914a82900000000a130494c59324032446a533ea43336ba21cad8c2e5a8cbe11fad2e00"/75, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303030302c759a65725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f6971f361a2643dd56cbce3da9c3e6a81354d7bdc16c803b47789998e5310bb46851479ac2b468fc61da2268e4fdbd9b82bdf19a0ea69e10bcfc84ee985cea92f459110d7754525e7f5a3a3cd0e8863aaa1c32693ffd57f0b0dc944e011f7313400708a17cbb03ac48748da6fa234119d64b56c3d51c94c9c4e7c", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:11 executing program 0: write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/consoles\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r3, 0x0, 0x4) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f00000000c0)) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r4, 0x0, 0x4) ioctl$USBDEVFS_REAPURB(r4, 0x4008550c, &(0x7f0000000080)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000000)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, 0x7, 0xffffffff, 0x5, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) 20:00:11 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="ad87f3fbf987e249f400f6ca8f647ed13341b847921d00000000000000072a05e09a41423e3aee251a0902d8db54cd8dcd864381088abdd22f1f4f13b0aacbd89d0203bb"]) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) [ 614.390538] overlayfs: unrecognized mount option "upprdir=./file0" or missing value [ 614.528083] overlayfs: unrecognized mount option "upprdir=./file0" or missing value 20:00:14 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) 20:00:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x2) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) pipe(&(0x7f0000000780)={0xffffffffffffffff}) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f00000009c0)) syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000140)='.//ile0\x00', 0x158, 0x7, &(0x7f0000000a00)=[{&(0x7f0000000480)="90e970aea5257bf8250a957a4830d66151a43079cfaa4ff4a21e641384f763bbbeb06a5eae480de0db7cbaa576ce3bb291ac3c26836a5f751b2e36fb92bd61dd15e5d5c5727075b6e47796dc1a19d9dc249bbcd12e5fef7c2d4ebbf7ec8ba8ce218aa5f200626bec81e8e4e272d87dcbf4f3384d423e5fa907a7780ee2a23574bf0cb697a03c6030d25064a7c82b58904d1c9e00c29215af2282599ac7742faa1006eae0328f071da1907525b1fb850d25226512021225af295cc7ed4a1f9b2fa8a34e70baf15537f065b594e479922f3dfff22b35234ca2e990ceccf43fa68632947dd546fdc2e85f48d718f35c2ed5e4", 0xf1, 0x2}, {&(0x7f0000000240)="ee206190f830ed582684e5c5d1d707881f2001bcdfd719ba9dc53caf2afdc9cc1b38129cd73b25812541234a4d17dd54a0cb3d6e4f386c42b0d484f3730c6db5a4f86349d8bc9a0adf49a94eea7376", 0x4f, 0x9}, {&(0x7f0000000580)="9c79cf1d2b3097932d1dd653207486793e74aaed9bcfa90e049e4d47f6af718e60e606ec017550b8dc3c505edd65d7fcf6dfd80fc17a8115380e915d47ad646975c6ef24e30a281145d0cdba3721ff957aa0ca5e2c9e39a7c5925fceecb1c2cf5ef2495ea9287d95813c4546fdddd761d333e6794f5a2c4841bf757a611b2ca9276766fb971a84f78a1300c58dbc1d9bf0f71fa9b29f29c65e26a5d13a0b5100b73fe476feff4a635f726284af4ddf704f97387d6026840dddf64d9668f4a844cf1bc6e01e58ba51da11c8ba7c24a93057780215", 0xd4, 0x2}, {&(0x7f0000000680)="023b7e4ddf435b4ee5e7ed537c29af7fa3bc402d4f6b1acc868e50b71357fc8611dda410371ab964cef8958e8c4b1505015a222740c62d6240ccd056138c53286bce68a45ddb9019db666b7af902a7bcb25a7ba7d44a1e96714bafbd5e99b7b90b04533312ae888c153644e4e08b533dc759d96ac5478aacc4e9567a9dc729476397523bd8729e3c862f5afe2824f3e11bc6d93c6b9d7f7cee51a98ae8820225292970b5552cc7261ec692998bf24966ee8943bd611de7731d933757e4275d64656d55e7752b3d13beaa74323e7681a9fe", 0xd1, 0xfffffffffffff800}, {&(0x7f0000000180)="8e52800002d7aa6049657e75b99e906238a9bd06521583b314437477be1551d94a1089cb767e4f619e3c609477f44012b3", 0x31, 0x80000000}, {&(0x7f00000007c0)="6576efccba2eeb166488f856bbb09d5c2550ecb70555a9cf62451de7a1d5d5fd8f403d4994ca6c96146a3506be3afa41fb63f39feff6cd1fdfa88c3b07a5a4c9de00d13d25b382574da372fa20aab31416faf21a64bebc2a143db01d55dc10cd1c8ed1356420b85b1aa3185cb0eaae073e16a7d7f580eaa8bb9e7d67d71ecb7a4d1d8bd856d96903c7723ad8ca37689c51a46c7d64a1626725d361028f006cab3505d7e79847a7d19a83a6ad9bedad32280c0b5728bb489cb5f5189c866deb6116f59c405ce31cf7d1d55096af2ed1de73f426eff7d5c7108fc64700b582c21c9864ee08f9bcab79683380b431af5c3cabda7356", 0xf4, 0x1}, {&(0x7f00000008c0)="043a6cfc8e337f3e29946ad812075cf5c6ab202f74344aeceecb05914a88c60da7a49b20edf35ecd4cdd896286c5b0db85dc4a1aa51955215ca24e1c46a7dd25b22a676b51b9fe79cf2f830a081bb1aac7b95584e8242de5b92a7930ab06cc472e3b4efa1f2ee381816b1cd213279a4e8dc165132a87815dcacaf2ad03701fa5727fd82b7434a15774a84b9377fce4094b", 0x91, 0x8000}], 0x22005c, &(0x7f0000000ac0)='posix_acl_accessnodevposix_acl_accesswlan0@[,vboxnet0securityem0self]\x00') mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="757070726469723d2e2f66696c65302c6c6f7765726469723d2e3a66696c65302c7790726b648072312f66696c6531"]) mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x1f) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x29) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e21, 0xd997, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xb6e}, {0xa, 0x4e22, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x101, 0x0, 0x1, 0x9, 0x2]}, 0x5c) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000000)={r4}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000380)={r4, @in={{0x2, 0x4e20, @multicast2}}, 0xffff, 0x3f, 0xd5, 0x4, 0x80000001}, &(0x7f0000000040)=0x98) 20:00:14 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="ad87f3fbf987e249f400f6ca8f647ed13341b847921d00000000000000072a05e09a41423e3aee251a0902d8db54cd8dcd864381088abdd22f1f4f13b0aacbd89d0203bb"]) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) 20:00:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:14 executing program 0: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000340)=""/82, 0x52}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0x8}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) r6 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000040), 0xfffff, r6) request_key(0x0, 0x0, &(0x7f0000000480)='\xf3F|$\x00\xac\xfaC\xe8{\x89\x80F\xc7G\xb7\xc0#z\xa1{\x91[\xd48+_\x1b\xb9\xd3t\x18\xd0\xe6\xfc\xb1+\r\x95\xd3HyV\b\xf5\xa2\xaa\xf2\xefz\x98\xff\xbb2\x1e\x81\x8c\xd3\xab*^\x93\xba\xe8\xe3[W\x82W', r6) keyctl$read(0xb, r6, &(0x7f0000000100)=""/50, 0x32) socket$nl_generic(0x10, 0x3, 0x10) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="4c0000001200ef09fffefd956fa283b7270fd917df226c24a6008000200000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f48d947f1e128a02500c57bb79ac313e5a1174c1f5c561412522e6ab7c67f57b0afbacf0b9c7a67cd4bd833", 0x77}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x68038, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0xfffffffe, 0x6, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) recvmmsg(r7, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) creat(&(0x7f0000000300)='./file0\x00', 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffe, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setlease(r8, 0x400, 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000001680)="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", 0xa77, 0x805, &(0x7f0000000140)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, 0x0, 0x0) 20:00:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) [ 617.335806] overlayfs: unrecognized mount option "upprdir=./file0" or missing value 20:00:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:14 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) [ 617.540938] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 617.550099] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 617.560881] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 617.570193] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 617.580963] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 617.590347] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 617.599892] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 617.612896] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 617.621845] audit: type=1804 audit(1585944015.141:55): pid=10296 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir462054526/syzkaller.Zwgtjs/727/file0" dev="sda1" ino=16196 res=1 [ 617.646689] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 617.656099] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 618.234434] audit: type=1804 audit(1585944015.771:56): pid=10305 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir462054526/syzkaller.Zwgtjs/727/file0" dev="sda1" ino=16196 res=1 [ 619.944340] NOHZ: local_softirq_pending 08 20:00:17 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:17 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) 20:00:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(r0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0x81}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x2000000000000082, &(0x7f0000001f80)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x400, 0xffffffffffffffff, &(0x7f0000000400)="c92719534425fb788db7065939eaa639e4e693dda8ea2b03f088ce59d248182d3cffea23aa05045ad0478f5b606f216cff80cd765d7140eaeb1b0cca23aa82cad404fd66cab340a30b194c57e82b068922f6a3a08242f56bd7ff89b57611311c6f4f810cf33a6853f1e59103289c5a0b60602766798741cc9216208b3f3bd2a60a18a812630b6b50b7f2f1b02562d1d412d5aae3", 0x0, 0x5}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x3, 0x8001, 0xffffffffffffffff, &(0x7f0000000780)="8f73df4018bb83b5dceea4feb616011a3355667636f48c2bdcb5642f1077b9f457aea05465f248c2f42f438884a46f6ee45ea4c354e2782d48486ec60b9ce523b2653c2e5982995a3a64540296d390ed608bdb56e59201704f1dbf950f303e604cc3f1763be2db73a9f2093c766995a135657ec7ecc0da683688a4efa66e5e631d291d2aa0ab6b206e0cab0a28fa52000e2aa6b1de6fad7be0a0747cb994106208b88b356ef0d9da05533e784a1e1351ca0f53008059cab8e4e146bb6762a81162565e39d3babef58abb8f483e65d56fa865a394ba", 0x0, 0x80, 0x0, 0x3, r2}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x6, 0xffffffffffffffff, &(0x7f00000008c0)="b69d139ca2a777c75d0c778fca619393a9d873fade8067d7c4854324b306f48e81bdede3ae2def10f6809bad9e0c1f46b29520032e7315e2c47ac0b02fdf7f2274fae85d211e3be2fee22fba878dbd799c0faadf5cd14adeb76f4cb508ebf55d93acd34bb19a880ab92af8a60147223adfa53077f4f784602549928fdd", 0x0, 0x7, 0x0, 0xd8167dbab6cca88a}, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x80, 0xffffffffffffffff, &(0x7f0000000a00)="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", 0x0, 0xfffffffffffffffe, 0x0, 0x2}, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x3, 0xff, r3, &(0x7f0000001a40)="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", 0x0, 0x401, 0x0, 0x2}, &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x7, 0x1, r2, &(0x7f0000001b80)="9d6f60ed7b51038f14e948e9562fa6b3e559b661fb704d8f3297636237e5c5cfe410675aff8f67163c46f73a9ed23e2e27fa15a1147b", 0x0, 0x5, 0x0, 0x1}, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, &(0x7f0000001c00)="bf9cd7f9546e6d3e3dcab477d26b8e5077e7b6c1c20285a75454e4b22689203b70a3b60b33f91db256a2c525e6abee7f74914e7ce2754e9b6f9b9a1975b1538e3a3a8ded5c84772691f847f4a116db600e30aeea14d0f1314f95213aed545db85098ecb73c6133e7a7f4e9e40377c02a59e5f8e3e09bc49ad9b19245f4f94943bfb94b8d9a0014982de822ad6295f23837bf70073b4974274342acae76415e40b34c", 0x0, 0xffffffff, 0x0, 0x0, r3}, &(0x7f0000001d80)={0x0, 0x0, 0x0, 0x2, 0x7fff, 0xffffffffffffffff, &(0x7f0000001d00)="80f9f6bf01c51a71614affa9c901e482e4abe03bbbcba01513c13c6ebf2f505218cff8be7fa647b47c7e1ac17d6477cfeeeedc879789dbe595b7941bd8f85026a7c1d4e96cbd3eefb197a40d8f8ca93d4c443bb859a6694aa0c1217360306b099364e4893f548a57613e7b0613", 0x0, 0xffffffff, 0x0, 0x89a2baf47bf3aa1c}, &(0x7f0000001ec0)={0x0, 0x0, 0x0, 0x8, 0x40, 0xffffffffffffffff, &(0x7f0000001dc0)="1633f1a52e5f1a4e39f5b4fee5a16b16802f0a15d534bd8b62cfe1febb297d395095374f0a08c45dc38f64ea1a3a5de45026fd769617ab369aa0add195eefa5b46bec887d6d37e92243c67a7b409e3e104ed0c45bb6c9abf84f64a0ad0aa02aa5971b584ed27ee6d603fb14afeb2c20992898db5edbf7c5502f24639bf417f18803c24d514f967414c419eca2df2f25d09719b1cfe24a1f040e4b1fd90015ade4128faefdfbeade0bdddb95541d7bf69e012c9d791e5a0dd08cfd19bcec4d1b4e83395ef92180e6ef08e79526909ecec76fc7aed356c34431a42c92f26d15778", 0x0, 0x7}, &(0x7f0000001f40)={0x0, 0x0, 0x0, 0x7, 0x3, 0xffffffffffffffff, &(0x7f0000001f00)="b79b03feca20ddc2705a3bdd8bf0", 0x0, 0xfff, 0x0, 0x3}]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="f904000000000000643db70a39a2b6860a443cc5573a1430923cf4ee8126d7cf9ac7479ca062b64292d2f423d6a913907a161b9129e8890001000000000000c93e5b", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:17 executing program 0: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000340)=""/82, 0x52}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0x8}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) r6 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000040), 0xfffff, r6) request_key(0x0, 0x0, &(0x7f0000000480)='\xf3F|$\x00\xac\xfaC\xe8{\x89\x80F\xc7G\xb7\xc0#z\xa1{\x91[\xd48+_\x1b\xb9\xd3t\x18\xd0\xe6\xfc\xb1+\r\x95\xd3HyV\b\xf5\xa2\xaa\xf2\xefz\x98\xff\xbb2\x1e\x81\x8c\xd3\xab*^\x93\xba\xe8\xe3[W\x82W', r6) keyctl$read(0xb, r6, &(0x7f0000000100)=""/50, 0x32) socket$nl_generic(0x10, 0x3, 0x10) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="4c0000001200ef09fffefd956fa283b7270fd917df226c24a6008000200000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f48d947f1e128a02500c57bb79ac313e5a1174c1f5c561412522e6ab7c67f57b0afbacf0b9c7a67cd4bd833", 0x77}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x68038, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0xfffffffe, 0x6, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) recvmmsg(r7, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) creat(&(0x7f0000000300)='./file0\x00', 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffe, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setlease(r8, 0x400, 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000001680)="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", 0xa77, 0x805, &(0x7f0000000140)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, 0x0, 0x0) 20:00:17 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000400)) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000300)=""/248, &(0x7f0000000000)=0xf8) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0xc0, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x70, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffff7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2000004, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x8}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0xc0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VT_ACTIVATE(r6, 0x5606, 0x7c0000000) 20:00:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x5, 0x0, 0x0, 0x5, 0x100}, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x294421, 0x0) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB="300000000706010800000080000000000000000a090002"], 0x1}, 0x1, 0x0, 0x0, 0x44801}, 0x40000) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x11, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS64(0xffffffffffffffff, 0x80605414, 0x0) io_setup(0x0, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:00:17 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) 20:00:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r0, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="01702ced8dd6a69ad4e8", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000002c0)) r5 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, 0x0) [ 620.368160] audit: type=1804 audit(1585944017.901:57): pid=10345 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir462054526/syzkaller.Zwgtjs/728/file0" dev="sda1" ino=16811 res=1 20:00:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') socket$inet6(0xa, 0x2, 0x0) [ 620.647850] audit: type=1804 audit(1585944018.181:58): pid=10339 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir999383674/syzkaller.GmQ5YA/552/bus" dev="sda1" ino=16817 res=1 20:00:18 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:18 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x1000, 0x9}, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='veno\x00', 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000000c00)=[{{&(0x7f0000002c00)=@x25, 0x80, &(0x7f0000002d80)=[{&(0x7f0000002d40)=""/41, 0x29}], 0x1}}, {{&(0x7f0000000200)=@isdn, 0x80, &(0x7f0000000300)=[{0x0}, {0x0}, {&(0x7f00000002c0)=""/57, 0x39}], 0x3}, 0x6}, {{&(0x7f00000004c0)=@nl=@proc, 0x80, 0x0}, 0xd6}, {{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000980)}, {&(0x7f0000000d40)=""/177, 0xb1}], 0x2, &(0x7f0000000b00)=""/221, 0xdd}, 0x7}], 0x4, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x7000) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000180)=""/118) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x6, 0x2, 0xfffffffffffffffc}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r5, &(0x7f00000017c0), 0x375, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f0000000380)={0x8, "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"}) 20:00:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030301d3021303030303030302c757365725f69643d9ea55f6294e17358bea5df223bb184bede0830dba27c7c0553e3c7dc00a56327f745998a13275b2fb3021b3b596d61197c36ac6c1420fad66aa83459869bca750e6561f19a9c9eb5d761040000000000004ddffc184f6be811878243e7e3de6369c56cffffff7f433f30e35e49df1369ff342fe0e7e9a2f47e87a31ff35b3b1163045c135937b12e66c5", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='loboup_id?', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0xa00028, &(0x7f0000000600)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:18 executing program 0: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000340)=""/82, 0x52}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0x8}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) r6 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000040), 0xfffff, r6) request_key(0x0, 0x0, &(0x7f0000000480)='\xf3F|$\x00\xac\xfaC\xe8{\x89\x80F\xc7G\xb7\xc0#z\xa1{\x91[\xd48+_\x1b\xb9\xd3t\x18\xd0\xe6\xfc\xb1+\r\x95\xd3HyV\b\xf5\xa2\xaa\xf2\xefz\x98\xff\xbb2\x1e\x81\x8c\xd3\xab*^\x93\xba\xe8\xe3[W\x82W', r6) keyctl$read(0xb, r6, &(0x7f0000000100)=""/50, 0x32) socket$nl_generic(0x10, 0x3, 0x10) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="4c0000001200ef09fffefd956fa283b7270fd917df226c24a6008000200000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f48d947f1e128a02500c57bb79ac313e5a1174c1f5c561412522e6ab7c67f57b0afbacf0b9c7a67cd4bd833", 0x77}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x68038, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0xfffffffe, 0x6, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) recvmmsg(r7, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) creat(&(0x7f0000000300)='./file0\x00', 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffe, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setlease(r8, 0x400, 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000001680)="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", 0xa77, 0x805, &(0x7f0000000140)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, 0x0, 0x0) 20:00:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:18 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') [ 621.334369] audit: type=1804 audit(1585944018.861:59): pid=10409 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir462054526/syzkaller.Zwgtjs/729/file0" dev="sda1" ino=16812 res=1 20:00:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:19 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x7, 0x2}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='\ad.', @ANYRESHEX=r5, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303034302c75736572c8e9cb4d5f69643de44386faaa43965c1c052308c8c64c74b8f2004309013733376bf9b6e787b318a590a2b0cc0245815c78a551634a471906ef9da0cdd985792025c38ea9770e90249c545b2a1800000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000640)=ANY=[@ANYBLOB="66502b6c3a37a980dee2f565d0e39a4e7f", @ANYRESHEX, @ANYBLOB="2c888d9c726f6f746d6f64ffffff7f0000000030303030303030303030303130303030302c757365725f", @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:19 executing program 0: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000340)=""/82, 0x52}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0x8}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) r6 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000040), 0xfffff, r6) request_key(0x0, 0x0, &(0x7f0000000480)='\xf3F|$\x00\xac\xfaC\xe8{\x89\x80F\xc7G\xb7\xc0#z\xa1{\x91[\xd48+_\x1b\xb9\xd3t\x18\xd0\xe6\xfc\xb1+\r\x95\xd3HyV\b\xf5\xa2\xaa\xf2\xefz\x98\xff\xbb2\x1e\x81\x8c\xd3\xab*^\x93\xba\xe8\xe3[W\x82W', r6) keyctl$read(0xb, r6, &(0x7f0000000100)=""/50, 0x32) socket$nl_generic(0x10, 0x3, 0x10) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="4c0000001200ef09fffefd956fa283b7270fd917df226c24a6008000200000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f48d947f1e128a02500c57bb79ac313e5a1174c1f5c561412522e6ab7c67f57b0afbacf0b9c7a67cd4bd833", 0x77}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x68038, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0xfffffffe, 0x6, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) recvmmsg(r7, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) creat(&(0x7f0000000300)='./file0\x00', 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffe, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setlease(r8, 0x400, 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000001680)="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", 0xa77, 0x805, &(0x7f0000000140)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, 0x0, 0x0) 20:00:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x5, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffe}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') [ 622.227509] audit: type=1804 audit(1585944019.761:60): pid=10471 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir462054526/syzkaller.Zwgtjs/730/file0" dev="sda1" ino=16809 res=1 20:00:22 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x840044, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@pcr={'pcr', 0x3d, 0x3c}}]}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x3201004, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r5 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, 0x0) 20:00:22 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:22 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:22 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:22 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:22 executing program 2: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c8184da66ce408c8c67", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:25 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) 20:00:25 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:25 executing program 2: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:25 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0xffffffffffffffff, 0x400000000000000}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x10080, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303030303030ada4af9eaf00fcbf643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x7a, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:25 executing program 2: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:25 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) 20:00:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:25 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:25 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) 20:00:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',r\x00\x00tmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c8184da66ce408c8c67", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c8184da66ce408c8c67", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x21, 0x0, 0xc, 0x2000000000, 0x0, 0x0, 0x10000}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') [ 630.183699] NOHZ: local_softirq_pending 08 20:00:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000580)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000300)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="66643d3ff10e022c9c68ab3fb0fb4d332ec03da32fc3dfb888e7de95a5ba89b4960db5", @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643ddc8f32eb879be29567bae9d4d4ccc7aee77423e2207249d406b7", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c8184da66ce408c8c67", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:29 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:29 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:29 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',r\x00\x00tmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000300)=[{0xffffffffffffffff, 0x10}, {}, {0xffffffffffffffff, 0x1000}, {0xffffffffffffffff, 0x89}, {r0, 0x100}, {0xffffffffffffffff, 0x3032}, {0xffffffffffffffff, 0x10}], 0x7, 0x8001) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r0, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6b746d6f64653d30303030303030303030c1303030303030303130303030302c757365725f6964", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000002c0)) r5 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, 0x0) 20:00:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000580)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000300)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="66643d3ff10e022c9c68ab3fb0fb4d332ec03da32fc3dfb888e7de95a5ba89b4960db5", @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643ddc8f32eb879be29567bae9d4d4ccc7aee77423e2207249d406b7", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726ff1f64db2643d", @ANYRESDEC=0x0, @ANYBLOB="060067b2ec737419363efcab34c27d8bde02a14e94dafc42087426a40d2261248a635847301b74114194abafd0fa6c793e45ef4794b29d7673b54eccdd09f2ec13040f3e5990880e1bd9bc43ce4c302715dfbd37df77f23e8caefeda"]) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000580)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000300)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="66643d3ff10e022c9c68ab3fb0fb4d332ec03da32fc3dfb888e7de95a5ba89b4960db5", @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643ddc8f32eb879be29567bae9d4d4ccc7aee77423e2207249d406b7", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x1000800, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6fdc063f36fed6cefc8e0a9d4c746d6f64653d30303030303030000000803030303030303d0000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000580)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000300)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="66643d3ff10e022c9c68ab3fb0fb4d332ec03da32fc3dfb888e7de95a5ba89b4960db5", @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643ddc8f32eb879be29567bae9d4d4ccc7aee77423e2207249d406b7", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:33 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000300)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x1000800, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6fdc063f36fed6cefc8e0a9d4c746d6f64653d30303030303030000000803030303030303d0000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:35 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="1100463daaf90d64445c6a38a946554b53858f54eb5e8c611ebad5351b98c5bc43d51802a59992f73e9f6d5913eea7856652a79a35e97e39a9fd3a4dbaeef20d68a24b7fd7c774de693fa6f4204ed1de9d0e467bdb9327bbbd546734dc32ec0e63806a46b7ca6b77820c79392d3da0b2a67d719d6dc630db16a79011c55dbb5431cc36b26ad50988f9a280c6f3cbbd2d0603b466daaf529d0e5dc90bea260bd3fde014db5def865703b3a1f9a73b3ef618ae32e1a86ec4d4f779fe061e95596024f00be6a855b9a1d8b23ea3c68580bb9949e6a38786d2d3c0edcf693e40def374e3b64d281f702c596a30d1113452470828763613fa78bd0fb95cce0ce760f3c9d3f4b515805012e14d31fed1dcf49b16e0771f2d"]) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200024, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000280)={0x9, 0x1008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 4: socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x1000800, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6fdc063f36fed6cefc8e0a9d4c746d6f64653d30303030303030000000803030303030303d0000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:36 executing program 4: socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000400)=ANY=[@ANYBLOB="6993ca1caf1d93cd643dde", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 4: socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726ff1f64db2643d", @ANYRESDEC=0x0, @ANYBLOB="060067b2ec737419363efcab34c27d8bde02a14e94dafc42087426a40d2261248a635847301b74114194abafd0fa6c793e45ef4794b29d7673b54eccdd09f2ec13040f3e5990880e1bd9bc43ce4c302715dfbd37df77f23e8caefeda"]) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726ff1f64db2643d", @ANYRESDEC=0x0, @ANYBLOB="060067b2ec737419363efcab34c27d8bde02a14e94dafc42087426a40d2261248a635847301b74114194abafd0fa6c793e45ef4794b29d7673b54eccdd09f2ec13040f3e5990880e1bd9bc43ce4c302715dfbd37df77f23e8caefeda"]) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:37 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x6, 0x0, 0x0, 0x2}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x4a) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000400)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x20}}], [{@fsname={'fsname', 0x3d, 'cgroup*%$'}}]}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000300)={0x2c, 0x25, 0x1, 0x5, 0x1, 0x23, 0x1, 0x7b, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x5e, 0x2, 0x0, 0x0, 0x409}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:38 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x9, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:38 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:38 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000400)=ANY=[@ANYBLOB="29e5b5621fb2046b3c48d5352100f4c876ce50339a952227d77975e504f0d5ddef0f65d37afe5acb3d295f922b5801afcc20cab21bae0f072ebf1caafe5f801dd2c1455a426e16123cef15eee4cab7757d6e5850493f4d506df0f5c62f9bfe5b44649a53a3aafe5a909cbabe9a459b09467f355fabf46d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:38 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:38 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:38 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:38 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="77fce26438884ac313aa96c91366443d", @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000400)=ANY=[@ANYBLOB="29e5b5621fb2046b3c48d5352100f4c876ce50339a952227d77975e504f0d5ddef0f65d37afe5acb3d295f922b5801afcc20cab21bae0f072ebf1caafe5f801dd2c1455a426e16123cef15eee4cab7757d6e5850493f4d506df0f5c62f9bfe5b44649a53a3aafe5a909cbabe9a459b09467f355fabf46d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000400)=ANY=[@ANYBLOB="29e5b5621fb2046b3c48d5352100f4c876ce50339a952227d77975e504f0d5ddef0f65d37afe5acb3d295f922b5801afcc20cab21bae0f072ebf1caafe5f801dd2c1455a426e16123cef15eee4cab7757d6e5850493f4d506df0f5c62f9bfe5b44649a53a3aafe5a909cbabe9a459b09467f355fabf46d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000300), 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, 0x0) 20:00:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, 0x0) 20:00:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000400)=ANY=[@ANYBLOB="29e5b5621fb2046b3c48d5352100f4c876ce50339a952227d77975e504f0d5ddef0f65d37afe5acb3d295f922b5801afcc20cab21bae0f072ebf1caafe5f801dd2c1455a426e16123cef15eee4cab7757d6e5850493f4d506df0f5c62f9bfe5b44649a53a3aafe5a909cbabe9a459b09467f355fabf46d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:42 executing program 3: prlimit64(0x0, 0x3, &(0x7f0000000300)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000007c0)=[{{&(0x7f0000000400)=@pppol2tpin6, 0x80, &(0x7f0000000580)=[{&(0x7f0000000280)=""/41, 0x29}, {&(0x7f0000000840)=""/15, 0xf}, {&(0x7f0000000480)=""/218, 0xda}], 0x3, &(0x7f00000005c0)=""/5, 0x5}, 0xfff}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/233, 0xe9}], 0x1, &(0x7f0000000740)=""/69, 0x45}, 0xffffffff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='&\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x762, 0x1, 0x0, 0x0, 0xfffffffc}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0xa9484911e28238dd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="66643da3970ccb5a675eedd2f811e4ca7ae8f036761f759ec7a7a81283", @ANYRESHEX=r4, @ANYPTR, @ANYRESDEC=0x0, @ANYBLOB="2c67326f75703783484306d6a135fdaed469643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gr_i\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f6430303030303030303030303030f70045d03030302c267365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(r6, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:45 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000300), 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(r6, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') dup(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:45 executing program 2 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, 0x0) 20:00:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000300), 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x56, 0x3, 0x9, 0x800000000, 0x9, 0x2}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000340), 0x25, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r0, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="662afae6116b6b22640b92b998f19eeb6e5c29b8beb66c547aa100d96875a8d369e4baba47a75297f8f318cba3952d0fb225a53e691a774050c483e0e66c78a53e2b47aa3c6c5e6806f463899771c628fdf52f95eba7b6a2ad83f96c6c2bba72d5fc5ffeaff8204276b087912692283cec241d7d645da4060bde389c5f8d46c0180221a2f9dbc669deb9794b24df298ee70efd64c783c1d06b06c63d66abd21df52599cd5b2203b806a9e51982b1cf6e0179ba139f7bf5d1437635ce865c10a7b9a818c1ff02ccfd", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c673300040000000000d4d42ad9ad72eddf8e72904cf476360f482b7fdb62bff2e76e16004c360c02bc9d15efd3f22b0a076b57d928f8355b112369aff5d9944b8f39871f614af26deed78a53b32b2a4bbc198f4f30c5ef240a00ab15a41884b9996c156c4a6af82e8197511aa5f9e5112c08276c5b4e78f8f2ce6148a20f0b8ea352d75835792df5a7a89b22a2b5426574fe4d031623ee8f832fbbc329881e2da626fbefd7b39a2b8f3e5e1f44b344a3e9b0e8d11b907b089f14cd731e58a6a239c931a0aa6aeea996356fe75f1490a779380ba98cd6baacac506e41c40a554d81bd2e308e1525a79db2a24ae8c104075622c082d52b2350dbd9544e41fa7b651df4dafddf58662e192eb69058c91995ffffc7f3bf1df45258a9f7891cb68befacf92fcaa01fd2ad9099d233d79e0f03d9cf8356fdcab6b2b6421122f1854c125acba640a2bdccef7a15e68b2bd399de460516", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x2000, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000002c0)) r5 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, 0x0) [ 648.359532] FAULT_INJECTION: forcing a failure. [ 648.359532] name failslab, interval 1, probability 0, space 0, times 0 [ 648.392015] CPU: 0 PID: 11382 Comm: syz-executor.2 Not tainted 4.14.175-syzkaller #0 [ 648.399954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 648.409334] Call Trace: [ 648.411927] dump_stack+0x13e/0x194 [ 648.415558] should_fail.cold+0x10a/0x14b [ 648.419713] should_failslab+0xd6/0x130 [ 648.423686] __kmalloc_track_caller+0x2e1/0x7b0 [ 648.428342] ? check_stack_object+0x6e/0xa0 [ 648.432654] ? strndup_user+0x5b/0xf0 [ 648.436445] ? __check_object_size+0x112/0x28a [ 648.441149] memdup_user+0x22/0xa0 [ 648.444703] strndup_user+0x5b/0xf0 [ 648.448399] keyctl_restrict_keyring+0xb9/0x160 [ 648.455922] ? keyctl_session_to_parent+0x8c0/0x8c0 [ 648.460957] ? SyS_read+0x210/0x210 [ 648.464607] SyS_keyctl+0x69/0x2a2 [ 648.468144] ? keyctl_restrict_keyring+0x160/0x160 [ 648.473075] do_syscall_64+0x1d5/0x640 [ 648.476977] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 648.482165] RIP: 0033:0x45c849 [ 648.485352] RSP: 002b:00007f7a42395c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 648.493053] RAX: ffffffffffffffda RBX: 00007f7a423966d4 RCX: 000000000045c849 [ 648.500327] RDX: 0000000020000480 RSI: 000000000a988f4c RDI: 000000000000001d [ 648.507585] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 648.514845] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000004 [ 648.522198] R13: 00000000000006f4 R14: 00000000004d5100 R15: 0000000000000000 20:00:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:48 executing program 5 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, 0x0) 20:00:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0000cf473d006262b249d1d72240ab311a86da93491c366d526825b779214efac7c311145f9f24e8cdf9a72f30127a304bf4c05fcef530bed541a06b79b50a83fd4f070abae57ac3bc6e001c3f1771401ad09e6f8a611e45"]) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d80452da7ea2f8b6889a4103f3bf7cbac07e95327233d00905b52b15a0fded5e969dd363f5db08358a857d1b2b036eae8787ff8fffae8e139", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = add_key(&(0x7f0000000780)='pkcs7_test\x00', &(0x7f00000007c0)={'syz', 0x0}, &(0x7f00000019c0)="b918f744490e62e6ff03766ceb57fe6dc652de325a3827cac9987ad43aae271d8accaf7ef582528975b2ee32a057445ebb7c9657834c6fedf491cbbd7e6f9d42c6c96eb1dfab8d567127bd2fdafe11a65fd8ec65d65da8b14c2942b2713cd135d0ea9e95e337919ca6b28718447162156947a94377ece17397a66fb0c713cd947c49832a778e4d1afbbc6c8c47ce40ed9be96f5ee6a5735447d0f4dd7e341cab7b17c95a5556eb70fd", 0xa9, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000080)="910405f1fae8dd853f6d7010e0a2d83ff313d5725c923bac14d1705feb0926d648c3b9185aa5f122e8d6fd1b712576c1798038611e83e864cc84d1fe2238f4faafec4a39452586b2c9d26d78fb3297792d25b56b016e54ecc9d74d7d1f4f44387ae13da2351bf979ecf2b984ee86de4db48d9aa8e0086b310d", 0x79}, {&(0x7f0000000140)}, {&(0x7f0000000180)="c6e0a5474f94992729df8ece6a9ae8ce", 0x10}, {&(0x7f00000001c0)="353e01fa6abfe58815bb65073f062c97eab207617316f9605c799f25518d417587c0176c38b7b3da1e785919d56df08f8c16d6ed64a2470b26c93d419ef37f90cc745cb2ee9ef3ee1864d087c112af65fb6f793c86289b91edd9fe01f8d23121c98d63d51f4a6c4f31480d9dc129902e4a7979e2abf8d029201129b7308a0d43651eec4655729716652adb4fbfb73ed76aac90a8caa70c748e1edf9a36da583fd52945b90fd3c1d30c61602df564e179daba7add5da90a6eb6ecb0d0b5b8dd81d2a346f5e5ccbeebbb1ca17a970acd", 0xcf}, {&(0x7f00000009c0)="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", 0x1000}, {&(0x7f00000002c0)="4f52d48df070e25d601743aca934059473132d8b12b4fcf7144e5bd3ca26fe12d3921baf875e9b7e94579c025abbd9acc7ebdab0921ef945c1fb45a4d1fff0900a80ab7ae437f0964665e8e4a31a8531", 0x50}, {&(0x7f0000000340)="2118c528f90268746c756b591a49a1fd92d5921d08278aecdcc1fedbf251d70e0e74c704211e032371af613dce91c2f9cb9fdd3f9bf259a83ae94a616c10be42cae8ce5e95823196f86354bcc8", 0x4d}, {&(0x7f00000003c0)="389cd47396348e9f2258a39deca6879c28977c9de3b4d3d98f766f27ffdc4e0613c4cb2cda9d987b0e080086bacdbcde98c77acfb9175a2ed52662977747c44c3bf158cf4907a33cb843b22d25a073c29eeab86adb8ab3488acf6e3e9b5f1539b1c48e1937e2108515bad231fd8e33eba7065f1a1bc04b0b29e0e859d7f8c62a6c76e245ad237d1615a6f3d5c34a389c300e911f75a4641b3fa3ca0b351006027cf288cd8cc9f15ae94868c8a56fbc1ef203a1a25f293fadca6832decb04ce2672ced1832c7966", 0xc7}, {&(0x7f00000005c0)="78f91d6246faf3eef61d97969efd88840fb4ab7cd2b951f4aed0cf78d99e9e", 0x1f}, {&(0x7f0000000600)="ee0664c65565dbe05747f65af7212d706d18b544e3885327d93e05c665dbb5a1fc975161fe7e9d8afc2c68b0633a76f6d2346977196f76876b8c55636c57adb7c131abee70da60ca13e30ce5f58b2ed8b01b1cbca4f6b14dc34685d0c8efb2a28f921db916fd66e1d6ab3a4f22058b9b83d0976640056577c6c402016e6f166176944c40dc646a5860cabd80ffabb3f2e45dc60a7a79dc61ef95d9d55df522054d4efe6ec7141a888cedc30d63841d048dd569f581ab740d8fb3c20581adb5", 0xbf}], 0xa, r2) recvmmsg(r1, &(0x7f0000005e40)=[{{&(0x7f0000000000)=@caif=@dgm, 0x80, 0x0, 0x0, &(0x7f0000000800)=""/160, 0xa0}}, {{&(0x7f0000000900)=@ax25={{0x3, @null}, [@netrom, @rose, @remote, @bcast, @remote, @null, @null, @rose]}, 0x80, 0x0, 0x0, &(0x7f0000001bc0)=""/46, 0x2e}}, {{&(0x7f0000003140)=@sco={0x1f, @none}, 0x80, &(0x7f0000000980)=[{&(0x7f00000031c0)=""/213, 0xd5}, {0x0}, {&(0x7f0000003380)=""/239, 0xef}, {&(0x7f0000003600)=""/44, 0x2c}], 0x4}}, {{&(0x7f00000037c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000005d40)=[{0x0}, {&(0x7f0000005a40)=""/213, 0xd5}, {&(0x7f00000060c0)=""/237, 0xed}, {&(0x7f0000005b40)=""/128, 0x80}, {0x0}, {&(0x7f0000005c80)=""/161, 0xa1}], 0x6, &(0x7f0000005e00)=""/24, 0x18}, 0xffff0000}], 0x4, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) socket$can_raw(0x1d, 0x3, 0x1) 20:00:48 executing program 2 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, 0x0) [ 650.609422] FAULT_INJECTION: forcing a failure. [ 650.609422] name failslab, interval 1, probability 0, space 0, times 0 [ 650.649867] CPU: 1 PID: 11407 Comm: syz-executor.5 Not tainted 4.14.175-syzkaller #0 [ 650.657786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.667228] Call Trace: [ 650.669814] dump_stack+0x13e/0x194 [ 650.673448] should_fail.cold+0x10a/0x14b [ 650.677593] should_failslab+0xd6/0x130 [ 650.681553] kmem_cache_alloc_trace+0x2db/0x7b0 [ 650.686309] ? perf_trace_run_bpf_submit+0x113/0x170 [ 650.691406] assoc_array_insert+0xcc/0x2cf0 [ 650.695718] ? perf_trace_lock_acquire+0x32c/0x4b0 [ 650.700642] ? perf_trace_lock+0x4b0/0x4b0 [ 650.704863] ? assoc_array_cancel_edit+0x80/0x80 [ 650.709703] ? lock_acquire+0x170/0x3f0 [ 650.713689] ? __key_link_begin+0x1a0/0x2b0 [ 650.718000] __key_link_begin+0x106/0x2b0 [ 650.722135] key_link+0x70/0x230 [ 650.726377] ? security_key_permission+0x83/0xb0 [ 650.731293] ? __key_link_end+0x120/0x120 [ 650.735437] ? key_task_permission+0x158/0x320 [ 650.740008] keyctl_get_persistent+0x4df/0x790 [ 650.744578] ? proc_keys_show+0xb20/0xb20 [ 650.748728] ? vfs_write+0xff/0x4e0 [ 650.752353] ? SyS_write+0x14d/0x210 [ 650.756076] SyS_keyctl+0x98/0x2a2 [ 650.759605] ? keyctl_restrict_keyring+0x160/0x160 [ 650.764552] do_syscall_64+0x1d5/0x640 [ 650.768430] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 650.773606] RIP: 0033:0x45c849 [ 650.777388] RSP: 002b:00007f98baa47c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 650.785087] RAX: ffffffffffffffda RBX: 00007f98baa486d4 RCX: 000000000045c849 [ 650.792352] RDX: 000000002fc50757 RSI: 0000000000000000 RDI: 0000000000000016 20:00:48 executing program 2: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_AUDIO(r3, 0x40345622, &(0x7f0000000000)={0x7, "0aa246e1cac1c73961391393c43038a54b8b05fb46ae1f334adb0093adf2049e", 0x1}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000140)={0x9d0000, 0x3, 0x100, r2, 0x0, &(0x7f00000000c0)={0xa2092a, 0x0, [], @p_u16=&(0x7f0000000040)}}) mmap$usbfs(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000, 0x110, r4, 0x0) syz_open_procfs(0x0, 0x0) [ 650.799626] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 650.806893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 650.814154] R13: 00000000000006fb R14: 00000000004c9c91 R15: 0000000000000000 20:00:48 executing program 5 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, 0x0) 20:00:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x200000000000000}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6706dc70705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_RESET(r2, 0x4141, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000001c0)=""/85) mmap$dsp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000006, 0x1010, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, 0x0) [ 651.037332] FAULT_INJECTION: forcing a failure. [ 651.037332] name failslab, interval 1, probability 0, space 0, times 0 [ 651.077990] CPU: 1 PID: 11437 Comm: syz-executor.5 Not tainted 4.14.175-syzkaller #0 [ 651.085911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.095276] Call Trace: [ 651.097877] dump_stack+0x13e/0x194 [ 651.101518] should_fail.cold+0x10a/0x14b [ 651.105766] should_failslab+0xd6/0x130 [ 651.109751] kmem_cache_alloc_trace+0x2db/0x7b0 [ 651.114436] assoc_array_insert+0x6ec/0x2cf0 [ 651.118853] ? perf_trace_lock_acquire+0x10d/0x4b0 [ 651.123789] ? perf_trace_lock+0x4b0/0x4b0 [ 651.128030] ? assoc_array_cancel_edit+0x80/0x80 [ 651.132795] ? lock_acquire+0x170/0x3f0 [ 651.136769] ? __key_link_begin+0x1a0/0x2b0 [ 651.141100] __key_link_begin+0x106/0x2b0 [ 651.145258] key_link+0x70/0x230 [ 651.148636] ? security_key_permission+0x83/0xb0 [ 651.153393] ? __key_link_end+0x120/0x120 [ 651.157554] ? key_task_permission+0x158/0x320 [ 651.162160] keyctl_get_persistent+0x4df/0x790 [ 651.166756] ? proc_keys_show+0xb20/0xb20 [ 651.170915] ? vfs_write+0xff/0x4e0 [ 651.174562] ? SyS_write+0x14d/0x210 [ 651.178281] SyS_keyctl+0x98/0x2a2 [ 651.181824] ? keyctl_restrict_keyring+0x160/0x160 [ 651.186757] do_syscall_64+0x1d5/0x640 [ 651.190654] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 651.195845] RIP: 0033:0x45c849 [ 651.199032] RSP: 002b:00007f98baa47c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 651.206863] RAX: ffffffffffffffda RBX: 00007f98baa486d4 RCX: 000000000045c849 [ 651.214142] RDX: 000000003e8ccf86 RSI: 0000000000000000 RDI: 0000000000000016 [ 651.221424] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 651.228701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 651.235975] R13: 00000000000006fb R14: 00000000004c9c91 R15: 0000000000000001 20:00:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:51 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$2(0x2, 0xffffffff, &(0x7f00000001c0)=""/97) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_FBUF(r3, 0x4030560b, &(0x7f0000000000)={0xb8, 0x0, &(0x7f00000004c0)="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", {0x9, 0x5, 0x32314247, 0x3, 0xe6, 0x1, 0x1, 0x22d1c0ce}}) syz_open_procfs(0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) 20:00:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000340)="d319901d8c6811b2a369f9bc", 0xc}, {&(0x7f0000000980)="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", 0x1000}], 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:51 executing program 5 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, 0x0) 20:00:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x200000000000000}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6706dc70705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000040)=0x2) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_LINK(r4, 0x40044160, &(0x7f00000001c0)=0x1f) pipe(&(0x7f0000000140)) 20:00:51 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000300)=0xfffffffffffffe17) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x200000000000000}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6706dc70705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:51 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) request_key(&(0x7f0000000340)='trusted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)='keyring\x00', 0xfffffffffffffff8) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x9800, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gro=\x00\x00\x00\x00\x00', @ANYRESDEC=r1, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303366662c6d61785f726561643d3078303030303030303030303030303030352c726f6f74636f6e746578743d726f6f742c736d61636b66736861743d2f5b24b62c7065726d69745f646972656374696f2c646566636f6e746578743d73797374656d5f752c7365636c6162656c2c7569643e", @ANYRESDEC=r2, @ANYBLOB=',dont_mease,uid<', @ANYRESDEC=r3, @ANYBLOB=',\x00']) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r5) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000400)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r8) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x9800, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB="2c6d61785f726561643d307830303030303030a3144be163af3a46a8aa3030303030303366662c6d0400000000000000307830169ab12081b0fd8fff00090000000000726f6f74636f6e746578743d726f6f742c736d61636b66736861743d2f5b24b62c7065726d69745f646972656374696f2c646566636f6e746578743d73797374656d5f752c7365636c6162656c2c7569643e9af4342665da33cbb2bdc40600fdf13adf0c5414d7181ee12c57fa56689639cf891d90230cf0c10959caa7ce12f27940eaa3f7182ae3b6e16846e02175b51779dd48bcd0decf664ed7c74f402aefe47cc39407", @ANYRESDEC=r7, @ANYBLOB=',dont_measure,uid<', @ANYRESDEC=r8, @ANYBLOB="d7dc0756af50cba1fc638b8c33fe56d6e1efdefd1e59eaba74779f97ae4224e9f42b732bcfc0379138c70904c06a7ee08008ba100798c04f818c28a4673eb5dcf3564ed54cc0d8ebfcdc5ae354bf64ed093e933a3050f5428eaee2a966bd473b935d4abc854d9d6201232f78cca275f3325e704cb445b39a3af2c7"]) getgroups(0xa, &(0x7f0000000140)=[0xee00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, r6, 0xffffffffffffffff]) keyctl$chown(0x4, 0x0, 0x0, r9) syz_open_procfs(0x0, 0x0) 20:00:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="9d5617bfed471dc86cd9ab5e3713a4882f95b4a7dec61cbe6d249721243ef8e6fe2d12c7fe5c65b57af44cfd3afae17795a22c8338", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x610) fsetxattr(r1, &(0x7f0000000000)=@known='com.apple.system.Security\x00', &(0x7f0000000040)='#vmnet0systemeth0vboxnet1\x00', 0x1a, 0x1) syz_open_procfs(0x0, 0x0) 20:00:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000001c0)=""/4096, &(0x7f0000000000)=0x1000) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000011c0)=ANY=[@ANYBLOB="eed8d85e67f2ac1a461c763f973a24c3ce874cc2b69564ef58c010a65d2049e2153486a36ebad048d7d52d497caec8b1d2be1aebbc2a2b78242fc8e1058b2fbd98b193942facdada1a0f1ab5c19adcb4dd993f0b77347e7bb62cbef2b1bda40333a4b1c60dc8", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0xc) 20:00:52 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x200000000000000}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6706dc70705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x2384, 0x4) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) syz_open_procfs(0x0, 0x0) 20:00:52 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:54 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@generic={0x2, 0xffff, 0x5}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$rds(r3, &(0x7f0000000040)={0x2, 0x4e21, @multicast2}, 0x10) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, 0x0) 20:00:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b0, 0x120, 0x1f0, 0x410, 0x410, 0x1f0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr="e632efa2372763f97f7e1233938a6596", [], [], 'batadv0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x3f}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@local, @loopback, [], [], 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x90, 0x0, &(0x7f00000001c0)=[@increfs={0x40046304, 0x2}, @dead_binder_done, @enter_looper, @reply={0x40406301, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000000)={@flat=@binder={0x73622a85, 0x1001, 0x2}, @fd={0x66642a85, 0x0, r0}, @fd={0x66642a85, 0x0, r1}}, &(0x7f0000000100)={0x0, 0x18, 0x30}}}, @increfs_done, @enter_looper, @increfs={0x40046304, 0x1}, @increfs_done={0x40106308, 0x2}], 0xc5, 0x0, &(0x7f0000000280)="1a72ff2ef0345ffe9eb2af714acd0b0410aeb52b04d1685137e5dc9e21d3eb03bbaa72902ccbb01b1501f8a6d0a52564564912bac41fe02d048b150dca0bcc668025ac49efd05fe3da2610c7b1947c493bbda775756d924eb3928ed037725c1af07361fbd8b5cc09183f885baae2dbace06d832f7ce0ffc5eef30b0c4a2512b48a58280e4b018c916570e20a0d48a137f29bb29e0887864b162ddd87510d455192c61f45480f2f5a679db6c9109947c3590be67d4ac3da6ce98bb71400f77ba1cf8b6acc4a"}) 20:00:54 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, 0x0) 20:00:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x67, 0x7, 0x1) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200080, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000040)=r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') syz_open_procfs(0x0, 0x0) 20:00:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x12}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x448841, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, 0x0) 20:00:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r1, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 20:00:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000500)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x8, 0xb3, 0xffffffffffffffff, &(0x7f0000000300)="94c6331772974f1f1f4612a7aee1110dbb898c67b599b87f98426c791569cddeea6f8aa7315d617ef435387bde958b75b7281f73c087d097e92a846d9ec6bc6c0b4132a2ae3194f176155392f1b650f404", 0x51, 0x40, 0x0, 0x1}]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="08000000800000000000003030303030303030303030000000e171e4d2462f18b0758765725f69641b00f870469bb26e3454bd3fce4ecaf8d295578b074d397284537800", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=r4], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r7 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r7, 0x40286608, 0x0) 20:00:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, 0x0) 20:00:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:55 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4a00, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000140)={0x0, 0x46, 0x9, &(0x7f0000000040)=0x3}) syz_open_procfs(0x0, 0x0) 20:00:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b11d9d8d21d5d6fe0eb92552fba4784466ebedb0400060000002000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228b5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a1aba827995c4ea917931c9f9abb4a2956cfba8227afd19e8f203e80efbe0b10d442ddd93cbf7be22e152bc74e1436c9cbafacbe4b03ba4b656f902950200000004aa86c8dc50de431490df98479af5e9ccd3c36c416e6ba34d30721ffc6933bff01000000000000428f750e12bf4123852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aea00eacf02770b1a212dc1b7aaf9da3a56bafd903dda39d4b228768cf60c9166fd918a0957297ea07a34ddb84a0091572e7ec182243047cb8d55402f00b82b8f9acd3927e6cb61e263414da54a35f41c5798eef611e7edda53709dae0ebf2c8458a9b7e910a37f5f8f7e5fec9fedd84c94eb099a7a1e4126248d2cd464c52e927c173badc285b908a6354041791dbdd4d80886da9b7a1f3f066bd999e3f05e74d714ecf58d608393ee9cbc170b7db9abf0685da52c7cae9d2e6c0ce81119177e407acee08d80fd5205465e826271dcd4e9f9b321762fbe674311fc15b3b32eddb5afccdd42f0cdd750e9d7c26974ba24449e8580fafb98c533c9be66645ede6d0800000000000017cf1dc0e92250bf6d314ecf82587a2adeef698f6132ff7ca2cb60424b9def1beec047247ded47013b535048fb4029db372db744683184d7d3ddbe080b3a8fe4ad9f40afd6883c20fc0ab7da00ab73ddd3231b9fc7472163936586234b53e4130ca7b02f454bce13a94a075a1cacb903d190f6132ceac54f4ae193d3ef2db2f0d60fb798a99a611b0b91a1e71810ecddb835b27988d447a6dae05af3556451b4479178f1129536048c2b72fe002797797ae9056c207b1fafb78f80e10507624cd1c54aa5eb776ea3d9"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 20:00:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="387ee2975f69643dfac2946ea502879a1a021f00a60c812544464836a94c3c7350093373f9b7f4f2bac4704409316d4d0d6649dbd77a170d13adf0b459b098393cbf9cc5a8e4a418a8583f96aa95a18fc148dcef03", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 20:00:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x10) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) 20:00:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r1, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 20:00:56 executing program 4 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, 0x0) 20:00:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa8200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') keyctl$get_persistent(0x16, 0x0, r1) r2 = add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$link(0x8, r0, r2) syz_open_procfs(0x0, 0x0) 20:00:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x682, 0x8a) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') r0 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getpeername$l2tp6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x20) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x8) 20:00:56 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000001c0)={0x3, "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"}) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, 0x0) 20:00:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000001c0)="6e77ffecfa51be3a10674b9b2beda42457a19d10e5a25270a240c00c586407bc648504740222ac72ec88b4a9f61087c33372148ef3c9baf66d5c0f73910e3b641240dad89968b2c9e5e54093dce3af4a5546946a71fbbcd49687ed7eba23d0fe0ef22b1bce1a8853ece4cee3652b1698e662d7e2ee411d14e1fb0da2c130be", 0x7f, r1) syz_open_procfs(0x0, 0x0) [ 658.964865] FAULT_INJECTION: forcing a failure. [ 658.964865] name failslab, interval 1, probability 0, space 0, times 0 20:00:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) [ 659.064898] CPU: 0 PID: 11716 Comm: syz-executor.4 Not tainted 4.14.175-syzkaller #0 [ 659.072817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.082178] Call Trace: [ 659.084807] dump_stack+0x13e/0x194 [ 659.088454] should_fail.cold+0x10a/0x14b [ 659.092621] should_failslab+0xd6/0x130 [ 659.096610] kmem_cache_alloc_trace+0x2db/0x7b0 [ 659.101300] assoc_array_insert+0xcc/0x2cf0 [ 659.105795] ? perf_trace_lock_acquire+0x10d/0x4b0 [ 659.110766] ? perf_trace_lock+0x4b0/0x4b0 [ 659.115018] ? assoc_array_cancel_edit+0x80/0x80 [ 659.119787] ? lock_acquire+0x170/0x3f0 [ 659.123773] ? __key_link_begin+0x1a0/0x2b0 [ 659.128118] __key_link_begin+0x106/0x2b0 [ 659.132280] key_link+0x70/0x230 [ 659.135785] ? security_key_permission+0x83/0xb0 [ 659.140557] ? __key_link_end+0x120/0x120 [ 659.144714] ? key_task_permission+0x158/0x320 [ 659.149313] keyctl_get_persistent+0x4df/0x790 [ 659.153909] ? proc_keys_show+0xb20/0xb20 [ 659.158064] ? vfs_write+0xff/0x4e0 [ 659.161705] ? SyS_write+0x14d/0x210 [ 659.165436] SyS_keyctl+0x98/0x2a2 [ 659.168988] ? keyctl_restrict_keyring+0x160/0x160 [ 659.174017] do_syscall_64+0x1d5/0x640 [ 659.177926] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 659.183125] RIP: 0033:0x45c849 [ 659.186318] RSP: 002b:00007f8e1f069c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 659.194036] RAX: ffffffffffffffda RBX: 00007f8e1f06a6d4 RCX: 000000000045c849 [ 659.201315] RDX: 000000003f107bd5 RSI: 0000000000000000 RDI: 0000000000000016 20:00:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000300)}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) [ 659.209117] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 659.216407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 659.223701] R13: 00000000000006fb R14: 00000000004c9c91 R15: 0000000000000000 20:00:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x800, 0x0) write$P9_RFLUSH(r1, &(0x7f0000000040)={0x7, 0x6d, 0x2}, 0x7) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xa}, 0x1c) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f00000001c0), 0x4) syz_open_procfs(0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) 20:00:56 executing program 4 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) syz_open_procfs(0x0, 0x0) 20:00:56 executing program 5: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6}, 0x0, 0x2, 0xffffffffffffffff, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000100)={0x9e0000, 0x0, 0x3, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x990a63, 0x6, [], @p_u16=&(0x7f0000000000)=0x8}}) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000200)={0x0, 0x0, {0x1, 0x1f, 0x7, 0x3}}) accept$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 20:00:56 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)=0x6) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r9) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x9800, &(0x7f0000000200)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r7}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3ff}}, {@max_read={'max_read', 0x3d, 0x5}}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, '/[$\xb6'}}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@seclabel='seclabel'}, {@uid_gt={'uid>', r8}}, {@dont_measure='dont_measure'}, {@uid_lt={'uid<', r9}}]}}) setresgid(r7, r5, r4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r10) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x10, &(0x7f0000000200)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3ff}}, {@max_read={'max_read', 0x3d, 0x5}}]}}) keyctl$get_persistent(0x16, r6, r1) syz_open_procfs(0x0, 0x0) [ 659.405839] FAULT_INJECTION: forcing a failure. [ 659.405839] name failslab, interval 1, probability 0, space 0, times 0 [ 659.431941] BUG: unable to handle kernel NULL pointer dereference at 0000000000000080 [ 659.440049] IP: l2tp_session_free+0x113/0x200 [ 659.444555] PGD 21811a067 P4D 21811a067 PUD 21a96d067 PMD 0 [ 659.450366] Oops: 0002 [#1] PREEMPT SMP KASAN [ 659.454857] Modules linked in: [ 659.459357] CPU: 0 PID: 11740 Comm: syz-executor.2 Not tainted 4.14.175-syzkaller #0 [ 659.467236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.476680] task: ffff8882109ba6c0 task.stack: ffff888202a58000 [ 659.482753] RIP: 0010:l2tp_session_free+0x113/0x200 [ 659.487769] RSP: 0018:ffff888202a5fcd0 EFLAGS: 00010246 [ 659.493141] RAX: dffffc0000000000 RBX: ffff8880a97dea80 RCX: 0000000000000000 [ 659.500414] RDX: 1ffff110152fbd81 RSI: ffff8882109baf40 RDI: ffff8880a97dec08 [ 659.507691] RBP: ffff8880a46f9280 R08: 0000000000000001 R09: 0000000000000000 [ 659.514967] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a46f9290 [ 659.522242] R13: 0000000000000000 R14: 0000000000000000 R15: ffff8880948ae510 [ 659.529626] FS: 0000000002be9940(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 659.529634] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 659.543761] CR2: 0000000000000080 CR3: 000000020307a000 CR4: 00000000001406f0 [ 659.551038] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 659.558311] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 659.565578] Call Trace: [ 659.568175] pppol2tp_session_destruct+0xcd/0x110 [ 659.573023] ? pppol2tp_seq_start+0x4e0/0x4e0 [ 659.577522] __sk_destruct+0x49/0x640 [ 659.581328] sk_destruct+0x97/0xc0 [ 659.584879] __sk_free+0x4c/0x220 [ 659.588351] sk_free+0x2b/0x40 [ 659.591554] pppol2tp_release+0x247/0x2f0 [ 659.595778] __sock_release+0xcd/0x2b0 [ 659.599672] ? __sock_release+0x2b0/0x2b0 [ 659.604342] sock_close+0x15/0x20 [ 659.607810] __fput+0x25f/0x790 [ 659.611094] task_work_run+0x113/0x190 [ 659.614983] exit_to_usermode_loop+0x1d6/0x220 [ 659.619575] do_syscall_64+0x4a3/0x640 [ 659.623495] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 659.628690] RIP: 0033:0x4163e1 [ 659.631877] RSP: 002b:00007ffe05850160 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 659.639583] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00000000004163e1 [ 659.646851] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 0000000000000005 [ 659.654129] RBP: 0000000000000000 R08: 00000000007714b8 R09: 01ffffffffffffff [ 659.661408] R10: 00007ffe05850230 R11: 0000000000000293 R12: 000000000076bf00 [ 659.668689] R13: 00000000007714c0 R14: 0000000000000000 R15: 000000000076bf0c [ 659.676113] Code: 97 fb 48 8d bb 88 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 d2 00 00 00 4c 8b ab 88 01 00 00 41 ff 8d 80 00 00 00 0f 88 03 85 7b 00 74 70 e8 58 af 97 fb [ 659.693897] CPU: 1 PID: 11755 Comm: syz-executor.4 Not tainted 4.14.175-syzkaller #0 [ 659.695313] RIP: l2tp_session_free+0x113/0x200 RSP: ffff888202a5fcd0 [ 659.703179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.709656] CR2: 0000000000000080 [ 659.719010] Call Trace: [ 659.725033] dump_stack+0x13e/0x194 [ 659.728811] should_fail.cold+0x10a/0x14b [ 659.732974] should_failslab+0xd6/0x130 [ 659.736961] kmem_cache_alloc_trace+0x2db/0x7b0 [ 659.741652] assoc_array_insert+0x6ec/0x2cf0 [ 659.746069] ? perf_trace_lock_acquire+0x10d/0x4b0 [ 659.751008] ? perf_trace_lock+0x4b0/0x4b0 [ 659.755253] ? assoc_array_cancel_edit+0x80/0x80 [ 659.760014] ? lock_acquire+0x170/0x3f0 [ 659.764092] ? __key_link_begin+0x1a0/0x2b0 [ 659.768427] __key_link_begin+0x106/0x2b0 [ 659.773108] key_link+0x70/0x230 [ 659.776584] ? security_key_permission+0x83/0xb0 [ 659.781352] ? __key_link_end+0x120/0x120 [ 659.785512] ? key_task_permission+0x158/0x320 [ 659.790106] keyctl_get_persistent+0x4df/0x790 [ 659.794699] ? proc_keys_show+0xb20/0xb20 [ 659.798952] ? vfs_write+0xff/0x4e0 [ 659.802582] ? SyS_write+0x14d/0x210 [ 659.806390] SyS_keyctl+0x98/0x2a2 [ 659.809931] ? keyctl_restrict_keyring+0x160/0x160 [ 659.814871] do_syscall_64+0x1d5/0x640 [ 659.818765] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 659.823953] RIP: 0033:0x45c849 [ 659.827254] RSP: 002b:00007f8e1f069c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 659.834966] RAX: ffffffffffffffda RBX: 00007f8e1f06a6d4 RCX: 000000000045c849 [ 659.842241] RDX: 000000002a0d97c1 RSI: 0000000000000000 RDI: 0000000000000016 [ 659.845265] ---[ end trace da323c55b40dd661 ]--- [ 659.849510] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 659.849515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 659.849520] R13: 00000000000006fb R14: 00000000004c9c91 R15: 0000000000000001 20:00:57 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2da) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) getsockopt(r1, 0x0, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 20:00:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x43c57734f3a4b8c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x14) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) [ 660.014455] Kernel panic - not syncing: Fatal exception [ 660.021376] Kernel Offset: disabled [ 660.025005] Rebooting in 86400 seconds..