ctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe436, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:38:26 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x3000000) 14:38:26 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x934, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000001c0)={0x4, [0x0, 0x0, 0x0, 0x0]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:27 executing program 2: prctl$PR_GET_CHILD_SUBREAPER(0x25) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0xd8fccb9f7dba5c36, 0x0) mmap$usbmon(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xb, 0x10010, r2, 0x9) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:27 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0xf000000) 14:38:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b70222e603400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r3, 0x934, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000240)=ANY=[@ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRES32, @ANYRESHEX=r0], @ANYRES32=r3, @ANYRES64=0x0, @ANYRESDEC, @ANYRESHEX=r0]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000100)={0x1ff, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x200003, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0xfffffffffffffffe]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:38:27 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x934, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES64, @ANYRESOCT=r1], @ANYBLOB=',rootmode=00000000000300000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="156c508791af2a0e7629969079", @ANYRESDEC=r0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:27 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x40000000) [ 451.495721][T15467] fuse: Bad value for 'fd' [ 451.518346][T15467] fuse: Bad value for 'fd' 14:38:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x24, 0x80000000002c00) 14:38:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:29 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0xebffffff) 14:38:29 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x100) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video37\x00', 0x2, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x101000, 0x0) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) 14:38:29 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000180)=0xcf) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:38:29 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) r4 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r5, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r8 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r8, &(0x7f0000000080)={0x11, 0x0, r9, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r10, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) r12 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r13 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r12, r13) getpeername$packet(r12, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) r15 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r15, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r15, &(0x7f0000000080)={0x11, 0x0, r16, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r17, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r18 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r18, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r18, &(0x7f0000000080)={0x11, 0x0, r19, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r20, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r21 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r21, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r21, &(0x7f0000000080)={0x11, 0x0, r22, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r23, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r24 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r24, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r24, &(0x7f0000000080)={0x11, 0x0, r25, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r26, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r27 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r28 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r28, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r27, r28) accept4$packet(r28, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000500)=0x14, 0x180800) r30 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r30, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r30, &(0x7f0000000080)={0x11, 0x0, r31, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r32, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r33 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r33, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r33, &(0x7f0000000080)={0x11, 0x0, r34, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r33, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r35, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r36 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r36, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r36, &(0x7f0000000080)={0x11, 0x0, r37, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r36, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r38, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r39 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r39, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r39, &(0x7f0000000080)={0x11, 0x0, r40, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r39, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r41, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r42 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r42, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r42, &(0x7f0000000080)={0x11, 0x0, r43, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r42, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r44, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r45 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r45, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r45, &(0x7f0000000080)={0x11, 0x0, r46, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r45, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r47, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r48 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r48, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r48, &(0x7f0000000080)={0x11, 0x0, r49, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r48, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r50, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r51 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r51, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r51, &(0x7f0000000080)={0x11, 0x0, r52, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r51, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r53, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r54 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r54, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r54, &(0x7f0000000080)={0x11, 0x0, r55, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r54, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r56, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) getsockname$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14) r58 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r58, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r58, &(0x7f0000000080)={0x11, 0x0, r59, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r60, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r61 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r61, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r61, &(0x7f0000000080)={0x11, 0x0, r62, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r61, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r63, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r64 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r64, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r64, &(0x7f0000000080)={0x11, 0x0, r65, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r64, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r66, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r67 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r68 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r68, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r67, r68) getsockname(r68, &(0x7f0000000c40)=@can={0x1d, 0x0}, &(0x7f0000000cc0)=0x80) r70 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r70, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r70, &(0x7f0000000080)={0x11, 0x0, r71, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r70, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r72, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r73 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r73, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r73, &(0x7f0000000080)={0x11, 0x0, r74, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r73, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r75, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r76 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r76, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r76, &(0x7f0000000080)={0x11, 0x0, r77, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r76, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r78, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f00000017c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001780)={&(0x7f0000000d00)={0xa58, r4, 0x1, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r7}, {0x26c, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r11}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x8, 0x0, 0x6, 0x8}, {0x200, 0x8, 0x7, 0x8}, {0x6, 0xdc, 0x3f, 0x1}, {0x401, 0x0, 0x9, 0xfffffffd}, {0xfffe, 0x7f, 0x5, 0x3}, {0xa6, 0x1, 0x0, 0x5}, {0x8001, 0x40, 0x4, 0x3ff}, {0x7, 0x9c, 0x4, 0x2}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffff}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r20}, {0x70, 0x2, [{0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x7f, 0x2, 0x20}, {0x5, 0x0, 0x3, 0x1}, {0x54d, 0x0, 0x4, 0x5}, {0x3, 0x20, 0x7, 0x6}, {0x1, 0x3, 0x8, 0x5}, {0x3d8, 0x2, 0x8, 0x1ff}, {0x0, 0xc3, 0x9, 0x590}]}}}]}}, {{0x8, 0x1, r23}, {0x84, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r26}}}]}}, {{0x8, 0x1, r29}, {0x84, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r32}}}]}}, {{0x8, 0x1, r35}, {0x160, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r38}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r41}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r44}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r47}}}]}}, {{0x8, 0x1, r50}, {0x130, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r53}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xdedc}}, {0x8, 0x6, r56}}}]}}, {{0x8, 0x1, r57}, {0x218, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r60}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r63}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r66}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r69}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x83}}}]}}, {{0x8, 0x1, r72}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r75}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r78}, {0xbc, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8}}}]}}]}, 0xa58}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) 14:38:30 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0xffffffeb) 14:38:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:30 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0xc4041, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x1a) 14:38:30 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40000, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0x6, &(0x7f0000005580)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, &(0x7f0000005640)=0xb0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={r3, @in={{0x2, 0x4e23, @broadcast}}}, 0x84) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:38:30 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x100000000000000) 14:38:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b70225e903400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x25, 0x80000000002c00) 14:38:33 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030010000000000000034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643de1edd1839cd759b1727318bd1b0a7710d92997acfcd084dfa3a7a36858ec0fcbe3f493", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f00000000c0)='ceph\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f00000002c0)='rootmode', 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000200)={0x0, 0x157, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01000000250100e1040004040803000000080042e1422f73fa64c2f4962e050004"], 0xffffffffffffff90}, 0x1, 0x6c, 0x0, 0x10}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)={0x74, r3, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0xd12, 0xffffffff, 0x3]}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x3, 0x9, 0xffffffff, 0x2, 0xfffffffc]}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_ALGID={0x8, 0x6, 0xec}]}, 0x74}, 0x1, 0x0, 0x0, 0x400c080}, 0x40) keyctl$get_security(0x11, r1, &(0x7f0000000300)=""/253, 0xfd) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vcs\x00', 0x41f001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) ioctl$SIOCAX25DELUID(r4, 0x89e2, &(0x7f00000005c0)={0x3, @default, r6}) 14:38:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x200000000000000) 14:38:33 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0xfb, 0x88, 0x200], 0x3c36c9aae898fc4f}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:38:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:33 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 457.192868][T15550] fuse: Bad value for 'rootmode' 14:38:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x300000000000000) 14:38:33 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 457.232353][T15545] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 457.250115][T15545] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 457.259302][T15559] fuse: Bad value for 'rootmode' 14:38:33 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c009c5b438857f42e10b0faee8374e4661b7902e47b51f7feea032928a816f837f20c6f70801b4419e347bc1c0879b6d4dba23cd33bea5406f6257804932bddc12946a8c64f92d09d629532d63356929e915d906561a28128d7c5714d58a4432b942202435fd24450d4"]) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) dup2(r1, r1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/124, 0x7c}, {&(0x7f0000000340)=""/168, 0xa8}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x3) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:33 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x40000, 0x0) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f00000002c0)=0xe9, 0x2) 14:38:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0xf00000000000000) [ 457.541516][T15576] fuse: Bad value for 'fd' [ 458.109632][T15587] fuse: Bad value for 'fd' 14:38:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x26, 0x80000000002c00) 14:38:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000180)={0x4, 0x94000}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81], 0xf000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) accept$inet(r0, &(0x7f0000000240)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:38:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:36 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000580)={0x0, 0x1, &(0x7f0000000400)=""/182, &(0x7f00000004c0)=""/63, &(0x7f0000000500)=""/89, 0x5000}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00'/10, @ANYRESDEC=r3, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) getresgid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) lchown(&(0x7f00000001c0)='./file0/../file0\x00', r6, r7) 14:38:36 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x4000000000000000) 14:38:36 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:36 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000000c0)=0x1) 14:38:36 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0xebffffff00000000) 14:38:36 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3900001a0601b3909e7a826e6af1ae09c405aad1001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:38:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 460.442951][T15627] fuse: Invalid rootmode [ 460.471311][T15632] fuse: Invalid rootmode 14:38:36 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0xffffffff00000000) 14:38:36 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000000ser_idO\x00'/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000340)='./file0/../file0\x00', 0x5cb93637411f24e7) [ 460.675826][T15648] fuse: Unknown parameter '0x0000000000000003' [ 460.702611][T15650] fuse: Unknown parameter '0x0000000000000003' 14:38:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x402, 0x80000000002c00) 14:38:39 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000d38d40cb901e2fbd00cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:38:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x700, 0x424140) ioctl$KDSETLED(r2, 0x4b32, 0x9) 14:38:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:39 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$PPPIOCDISCONN(r3, 0x7439) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:39 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\n', 0x1, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r3, 0xc4c85512, &(0x7f0000000440)={{0x6, 0x6, 0x5, 0x8, '\x00', 0x8000}, 0x0, [0x10001, 0xfff, 0x10001, 0x4b1b, 0x208, 0x80000001, 0x7, 0x80000001, 0x8001, 0x0, 0x7, 0x8, 0xfffffffffffffffd, 0x5, 0x400, 0xd8d, 0x2, 0x2, 0xffffffffffffffd9, 0x10001, 0x3a7, 0x52, 0x6, 0xc5, 0xffff, 0x6, 0x4715caa5, 0x80000000, 0x0, 0x0, 0x9, 0x8, 0xffffffff, 0x4, 0x101, 0x8, 0xffffffffffffffff, 0x80, 0xbd1a, 0x1, 0x7, 0x0, 0x1, 0x9f, 0x9270, 0xfff, 0x7ff, 0x3ff, 0x3, 0xffffffff00000000, 0x3, 0x80000000, 0xfffffffffffff401, 0x5, 0xcc73, 0x6, 0xffffffffffffff7f, 0x3, 0x0, 0x47, 0x75, 0x101, 0xffffffff80000000, 0xfff, 0x1, 0x6, 0x1, 0x890, 0xffff, 0x7, 0x3f, 0x4, 0x2, 0x82, 0x90000000000000, 0x5, 0x1, 0x2, 0x0, 0xffffffffffffdb99, 0x3, 0x2, 0x8, 0x4, 0x78d3, 0x10001, 0x100000000, 0x3, 0x0, 0x80, 0x7f, 0x96fd, 0x40, 0x100000001, 0x9, 0x5, 0xc35, 0x3ff, 0x3ff, 0x1, 0xfc, 0x5, 0x3, 0x7, 0xfffffffffffffffb, 0x0, 0x5, 0x3ff, 0x9, 0x7fffffff, 0x4, 0xaad, 0xffffffffffff0000, 0x100000001, 0x5, 0x93, 0x2, 0x1, 0xffff, 0x7, 0x4, 0x8, 0x1de6, 0x7, 0x4, 0x10001, 0x90, 0x8000], {0x0, 0x989680}}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000340)={{'\x00', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x3}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x600}}]}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:39 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x10002, 0x0, 0x2, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x2, 0x800, 0x13e3ef16000000, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0xfffffffffffffffd], 0x1000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r4, 0x8, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:38:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:39 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a06000000000100000000000000"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:38:39 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',bXoup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 463.741184][T15710] fuse: Unknown parameter '0x0000000000000003' [ 463.762784][T15713] fuse: Unknown parameter '0x0000000000000003' 14:38:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x406, 0x80000000002c00) 14:38:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:42 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x10204, 0x0, 0x10000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001], 0x0, 0x23201}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:38:42 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="2c00c2377c3c37e5fad93a14b639c408b7de6bacc7b56994cf225d42840b9bcd253d0bd08c5a9b96ee2a703db1437e85ee258df775673ed76e544101e107eba28493ffd951ee4ba93fa6fc7174536860a39c0ddea0ead22cae8f2a83810def10170fc0ffabe4e5f15873b943b864cc9fa8dc73bc6460a5cf65b12020e45d0a3981c438"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xdbe}}, {@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x1}}]}}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000240)) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) socket$alg(0x26, 0x5, 0x0) [ 466.325151][T15728] fuse: blksize only supported for fuseblk [ 466.342716][T15731] fuse: Bad value for 'group_id' 14:38:42 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0xd6) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="b33a72a61cd35f696456398d8a10c211b0b84f518ed60c93f5db0bf44c929ae1a3312163330ddc56cdfba70facc33ac5347ec90bca7b7e1257d8c21b59bd318d06522d765d546eb3ff0b81c66cd99bc0775f6651e78a22af4c46220c75765d22f60643b2fdf3c40e9a85ba0cab4f44f93d334c11638c41ee33dedb01dddd075d7e892714ea980556e83c16982a874834ffa0c8ed1a0d375775c93955def996cd979e259892763f3c02a748d0bd093e9e462885040e838e83ea5962e31a96f2a793bc1818e5a94dd08ebfacf360dcd1b23eae238bf2b4f17c3359f3566e861b2ec63232", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) connect$rxrpc(r1, &(0x7f00000001c0)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e23, 0x5, @loopback, 0xffff}}, 0x24) [ 466.389555][T15728] fuse: blksize only supported for fuseblk [ 466.403996][T15731] fuse: Bad value for 'group_id' 14:38:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mount$overlay(0x0, &(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)='overlay\x00', 0x808000, &(0x7f0000000400)={[{@index_off='index=off'}, {@metacopy_off='metacopy=off'}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/autofs\x00'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@hash='hash'}, {@euid_lt={'euid<', r3}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@hash='hash'}]}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x440000, 0x0) getsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f00000002c0)=""/90, &(0x7f0000000340)=0x5a) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[0x50, 0xc4347fa5d1a17cb0, 0x4e, 0x35, 0xcc, 0x61, 0x36, 0x31], 0x2d, [0x36, 0x36, 0x38, 0x844aaa47f63d0c47], 0x2d, [0xa9, 0x37, 0x63], 0x2d, [0x31, 0x65, 0x31, 0x64], 0x2d, [0x65, 0x30, 0x36, 0x38, 0x66, 0x37, 0x0, 0x38]}}}, {@measure='measure'}, {@subj_type={'subj_type', 0x3d, 'rootm\x7fd\x80'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd'}}, {@obj_role={'obj_role', 0x3d, 'fuse\x00'}}, {@uid_lt={'uid<', r3}}]}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:42 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x3c9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x1c6b, 0x3, "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", 0xaf, 0x6, 0x81, 0x3f, 0x5, 0x20, 0x81}, r4}}, 0x120) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) dup2(r0, r1) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="6c0000ef00000000f20ab253fa9070aa8c16"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfb]}) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) [ 466.599269][T15750] fuse: Bad value for 'user_id' 14:38:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB='-\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 466.670615][T15761] fuse: Unknown parameter 'fsuuid' [ 466.751603][T15771] fuse: Bad value for 'group_id' [ 466.792547][T15771] fuse: Bad value for 'group_id' [ 467.154412][T15750] fuse: Bad value for 'user_id' 14:38:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x407, 0x80000000002c00) 14:38:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x934, 0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x934, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r3, 0x934, 0x0) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r4, 0x934, 0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r5, 0x934, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r6, 0x934, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYPTR=&(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f0000000a80)=ANY=[@ANYRES64, @ANYRESOCT=0x0, @ANYPTR64], @ANYRESDEC, @ANYBLOB="ef617c812046cf0d51489363c1192f733f9458db16b1ec5179e01f5ebf1e19495e66a7da77e6cafc0cdeac53dc4b2aed10d97c429578637c54a62e7f3d2fbe5b9f9a703c46794550febff054832aaeac977c55565ab042961fb750cfe9fd64f6b47e1bde99dcedf47484859ba58e459310f9aac49a90888c23aa50454e0587d9d71f35c6c7a8235b88253026d429072d2ea051491df712b2d136e56aab1b483720c398", @ANYRESOCT, @ANYPTR=&(0x7f0000000900)=ANY=[@ANYRESOCT=r0, @ANYRES32=r4], @ANYRESHEX=0x0, @ANYRESDEC, @ANYRES16=r6], @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c75f5e0725f69643d0203c3000767d05c03c3e1c4d0d74ef47548e54be96424ae94c22a405b636a786d1282887fbfcada10c8eff86cf811be8c772fe07d477e7551ecb8b173817656ce8eadbe6beb9c658de12fda4b372b67b48401fcccca4deb3e410e2222543f5caecb9ce9bc4d01ba275c8e0a373d835a669848d2b5901d365be6a815abd75522bc71f463785cbd55151c36fac419a4f4c88eb2c7e58396c45d22ea918850576b501ee628d8a268306f745eee96f7541e7a49cd76bf040f68ce8120f4dd32", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESOCT=r1, @ANYBLOB="2c002a51f65554cb4c2f6096af2deaae864a7cfc503ed998ee006861b32947ab0ad5ea8820d7d7195b90e89a9c2e0098d50a14bc501a827acbaf4d81d2bbc105d417b81d123f080e86192e5a170ef81b48ce8582a1ae85a17a5b754afd8fecff03367994b509284bdcab89de07c26c082a1d193f0c6db88ee261f87e0f9652d23cb390bba53603ed4a098d4a1f6d4d13ee"]) r7 = creat(&(0x7f00000000c0)='./file1\x00', 0x31) ioctl$SG_GET_VERSION_NUM(r7, 0x2282, &(0x7f0000000240)) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r8, r9) ioctl$ASHMEM_SET_PROT_MASK(r9, 0x40087705, &(0x7f0000000280)={0x600000, 0x3b71}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:45 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.events\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r2, 0xc0c85666, &(0x7f00000002c0)={{0x4, @name="32d1c7c378e7f9b4aea2aa938081d7e11101cd2e29cd4e2ad3a7bdfd84766cdf"}, "61c0013a81bd86f2e794b50544147449c9410593d2cbd2bd45faceaa7759fa66", 0x2}) 14:38:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r1 = accept4$ax25(0xffffffffffffffff, &(0x7f00000002c0)={{0x3, @rose}, [@rose, @null, @remote, @rose, @bcast, @bcast, @rose, @rose]}, &(0x7f00000000c0)=0x48, 0x800) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'gretap0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}}) 14:38:45 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) read$eventfd(r3, &(0x7f0000000180), 0x8) connect$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x5, 0x50, 0x0, 0x1, 0x1, @broadcast}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 469.402940][T15789] fuse: Unknown parameter 'À' 14:38:45 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB='\x00\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:45 executing program 5: 14:38:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:45 executing program 5: 14:38:45 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000001c0)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) write$FUSE_INIT(r5, &(0x7f0000000340)={0x24, 0x0, 0x3, {0x7, 0x1f, 0xffffffa1, 0x2, 0x7fff, 0x7, 0xaae2, 0x8}}, 0xffffff7a) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r6, r7) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r7, 0xc058534f, &(0x7f00000002c0)={{0x20, 0x1f}, 0x1, 0xffffffff, 0x7, {0x8, 0xff}, 0x4, 0x1}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:45 executing program 5: [ 469.929222][T15789] fuse: Unknown parameter 'À' 14:38:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x408, 0x80000000002c00) 14:38:48 executing program 5: 14:38:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:48 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r2, &(0x7f0000000080)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400400}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="580000006600000425bd7000fbdbdf250000000000000000", @ANYRES32=r6, @ANYBLOB="020010000500f2ff0000003f00000008000b001b00000008000b00070000007f0000000000000008000b00ffffffff08000b00080000000000000000"], 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x800) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, 'group_id'}}, {@dont_hash='dont_hash'}]}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x7, 0x4) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000180)=0xe201) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:38:48 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x11946f79c551d68b) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(0xffffffffffffffff, r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r5, 0x934, 0x0) write(r5, &(0x7f00000002c0)="01d44c82f2c899b358c1bfb2c777fd4bca47ee9d222a21683518cdb44fef1086a65f28a678712a80ef9f01e0d8e5493dfbfc21d8b5734a9c4355d35a0347b2a2f2e0c08ab9bcb3b18375096ab0cea1e422458b36f0c395bd2692bd40fc0210317abe991b18054da24617ce37306d4c60fb39de854e34417a9b7505b69b0490c4a53c567187cad4124c1c64ba18bc194930ae46b57ceddf1e56d40fc6b70cfaef3e1542e3f3e2817571e8bb571b9f10d7264c55bffd28e72b4bc9b559939eb8351d0d2a6104109dd7e3967d6a115b04b4a5626414fba40b117c49d404", 0xdc) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0x6, &(0x7f0000005580)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, &(0x7f0000005640)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000001c0)={r7, 0x401, 0x1, [0x9]}, 0xa) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:48 executing program 5: 14:38:48 executing program 5: [ 472.590010][T15852] fuse: Unknown parameter 'dont_hash' 14:38:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:48 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="9d01409efcb4f2ff0300"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:38:48 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x100) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video37\x00', 0x2, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x101000, 0x0) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) 14:38:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x409, 0x80000000002c00) 14:38:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:48 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000000)=0x3ff, &(0x7f0000000180)=0x2) 14:38:48 executing program 5 (fault-call:2 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) [ 473.101800][T15890] FAULT_INJECTION: forcing a failure. [ 473.101800][T15890] name failslab, interval 1, probability 0, space 0, times 0 [ 473.116794][T15852] fuse: Unknown parameter 'dont_hash' [ 473.151783][T15890] CPU: 0 PID: 15890 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 473.159657][T15890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.170077][T15890] Call Trace: [ 473.173381][T15890] dump_stack+0x1fb/0x318 [ 473.177726][T15890] should_fail+0x555/0x770 [ 473.182152][T15890] __should_failslab+0x11a/0x160 [ 473.187099][T15890] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 473.192825][T15890] should_failslab+0x9/0x20 [ 473.197332][T15890] __kmalloc+0x7a/0x340 [ 473.201493][T15890] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 473.207232][T15890] tomoyo_realpath_from_path+0xdc/0x7c0 [ 473.212874][T15890] tomoyo_path_number_perm+0x166/0x640 [ 473.218357][T15890] ? smack_file_ioctl+0x226/0x2e0 [ 473.223372][T15890] ? __fget+0x431/0x510 [ 473.227545][T15890] tomoyo_file_ioctl+0x23/0x30 [ 473.232309][T15890] security_file_ioctl+0x6d/0xd0 [ 473.237234][T15890] __x64_sys_ioctl+0xa3/0x120 [ 473.241926][T15890] do_syscall_64+0xf7/0x1c0 [ 473.246431][T15890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.252327][T15890] RIP: 0033:0x45a639 [ 473.256210][T15890] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 473.275808][T15890] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 473.284218][T15890] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 473.292300][T15890] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 14:38:49 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x28) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB="145f260cc6d89147aafa4f876fc6e038adca5b030150ce9bf7a82f3ae1f9d7a418d730d8e2e20b4f14bde070421ed65a044cf1815716"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 473.300290][T15890] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 473.308256][T15890] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 473.316226][T15890] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 [ 473.325828][T15890] ERROR: Out of memory at tomoyo_realpath_from_path. [ 473.457266][T15902] fuse: Bad value for 'group_id' 14:38:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b70234f803400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:49 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r2, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/87, 0x57}, {&(0x7f0000000340)=""/198, 0xc6}, {&(0x7f00000001c0)=""/22, 0x16}, {&(0x7f0000000440)=""/130, 0x82}, {&(0x7f0000000500)=""/59, 0x3b}], 0x5, &(0x7f00000005c0)=""/156, 0x9c}, 0x7}, {{&(0x7f0000000680)=@hci, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/244, 0xf4}, {&(0x7f0000000800)=""/196, 0xc4}, {&(0x7f0000000900)=""/108, 0x6c}, {&(0x7f0000000980)=""/100, 0x64}, {&(0x7f0000000a00)=""/47, 0x2f}, {&(0x7f0000000a40)=""/182, 0xb6}, {&(0x7f0000000b00)=""/239, 0xef}, {&(0x7f0000000c00)=""/186, 0xba}], 0x8, &(0x7f0000000d40)=""/174, 0xae}, 0x53b1}, {{&(0x7f0000000e00)=@tipc, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000e80)}, {&(0x7f0000000ec0)=""/8, 0x8}], 0x2, &(0x7f0000000f40)=""/89, 0x59}, 0x7cb}, {{&(0x7f0000000fc0)=@generic, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001040)=""/136, 0x88}, {&(0x7f0000001100)=""/79, 0x4f}, {&(0x7f0000001180)=""/49, 0x31}], 0x3, &(0x7f0000001200)=""/243, 0xf3}, 0x6}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000001300)=""/80, 0x50}, {&(0x7f0000001380)=""/48, 0x30}, {&(0x7f00000013c0)=""/152, 0x98}, {&(0x7f0000001480)=""/246, 0xf6}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000002580)=""/31, 0x1f}, {&(0x7f00000025c0)=""/229, 0xe5}], 0x7, &(0x7f0000002740)=""/185, 0xb9}, 0xfff}, {{&(0x7f0000002800)=@xdp, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000002880)=""/227, 0xe3}, {&(0x7f0000002980)=""/7, 0x7}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f00000039c0)=""/71, 0x47}, {&(0x7f0000003a40)=""/57, 0x39}, {&(0x7f0000003a80)=""/230, 0xe6}, {&(0x7f0000003b80)=""/106, 0x6a}, {&(0x7f0000003c00)=""/246, 0xf6}, {&(0x7f0000003d00)=""/50, 0x32}, {&(0x7f0000003d40)=""/70, 0x46}], 0xa, &(0x7f0000003e80)=""/203, 0xcb}}, {{&(0x7f0000003f80)=@ax25={{0x3, @netrom}, [@default, @netrom, @bcast, @default, @default, @rose, @null, @bcast]}, 0x80, &(0x7f0000004140)=[{&(0x7f0000004000)=""/18, 0x12}, {&(0x7f0000004040)=""/239, 0xef}], 0x2, &(0x7f0000004180)=""/44, 0x2c}}], 0x7, 0x8000, &(0x7f0000004380)={0x77359400}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='c', 0x300, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r4, 0xfffffffffffffffc, r3, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000e80)={r3, 0x9b, 0x8c}, &(0x7f00000043c0)={'enc=', 'oaep', ' hash=', {'cbcmac-aes-ce\x00'}}, &(0x7f0000004440)="578fab8a7e5bc8c53ea4d6a1c0b6b9dc47150a0fc15cd7e24e2230fc1b538ae2028c6d9097d58f13dfad68b2911fbbf2a9e7794bc3a1f5bc3c31e759b0c90cc532cfbed19a5ca7efc528705977921f2e66711086198fce850e5032d371df539a26df83ec570c29daf07f64426e4901fd4b6c1f3db5eb2cf54a149aef37d4d82601571fae6c94c73a37d070f4e6fbd5216f99a5893485aa4b16658e", &(0x7f0000004500)=""/140) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r5, 0x934, 0x0) dup2(r5, r0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000500)={[0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd], 0x0, 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:38:49 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="eda524ca2cd48ff6ceee0ffbe5226007828061c53edf939d3a7707"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f00000001c0)=0xffffffffffffffff) [ 473.676182][T15900] fuse: Bad value for 'group_id' 14:38:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 473.777250][T15918] fuse: Bad value for 'group_id' 14:38:49 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a06a700000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 474.387518][T15922] fuse: Bad value for 'group_id' [ 475.407868][ T12] Bluetooth: hci0: command 0x1003 tx timeout [ 475.414003][ T1531] Bluetooth: hci0: sending frame failed (-49) 14:38:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x40a, 0x80000000002c00) 14:38:51 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYRES16=r0, @ANYRESDEC=r1, @ANYBLOB="2c00dac4a2e21e005cb5d342abc6d088087def9b21cbf0e0f37f6d9f826e6ce1eb6a266fff7033ef797bc326e2b5812e7d94b37f2071883cd8efdd6fe45dee64d8588b489a2f811ed4aa5164aac5389a88a25f163f83cd33d9daa3ba8649d18a3fdd861f1fb16165e736d24ef581ba3bfb82d079a0"]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x80440, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000240), &(0x7f0000000280)=0x4) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000440)={'nat\x00', 0x2, [{}, {}]}, 0x48) 14:38:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0xffff, 0x0, 'client0\x00', 0x8000000040000006, "003aec24561bbbe2", "7da194a53e81777594d971507854a8ff4f909cd325b8c69661b3d74262d7c571", 0x0, 0x1}) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="39cd0004000000000080000000000090c4"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x1d31) [ 475.954137][T15941] fuse: Bad value for 'fd' [ 476.477815][T15941] fuse: Bad value for 'fd' [ 477.487923][ T12] Bluetooth: hci0: command 0x1001 tx timeout [ 477.494274][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 479.567927][ T2878] Bluetooth: hci0: command 0x1009 tx timeout 14:38:59 executing program 5 (fault-call:2 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:38:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:38:59 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) io_uring_register$IORING_UNREGISTER_FILES(r4, 0x3, 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x21) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d2977c0481bb784e1552990ac5b9b33d911dd58ed1c44c31df317f786bfd6ba8ca57deb11f525b515df7e2fca62ae96a0a60731da92ad162b387ad6270983b4281779fa8485c0f9978f3214a65e3c817020a4f73bb70483d0348c4c8570b11ce3e8e321ac118bc6479252bd6009fe9230a7ab2c4e604c43eeb7b9588ceb63c899e038374021746e4596b66bf7be138647504c09f920fe70f40bbb43f4908bf246d995b3f8ed", @ANYRESDEC=r2, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r5, r6) r7 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0xfbfffffffffffffe) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) 14:38:59 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000340)={0x2, 0x0, [{0x4000, 0x2d, &(0x7f0000000180)=""/45}, {0x1003, 0x5d, &(0x7f00000002c0)=""/93}]}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:38:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x40b, 0x80000000002c00) [ 483.601938][T15974] fuse: Bad value for 'group_id' [ 483.628374][T15976] FAULT_INJECTION: forcing a failure. [ 483.628374][T15976] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 483.641735][T15976] CPU: 1 PID: 15976 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 483.649531][T15976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.659585][T15976] Call Trace: [ 483.662866][T15976] dump_stack+0x1fb/0x318 [ 483.667179][T15976] should_fail+0x555/0x770 [ 483.671580][T15976] should_fail_alloc_page+0x55/0x60 [ 483.676761][T15976] prepare_alloc_pages+0x283/0x460 [ 483.681892][T15976] __alloc_pages_nodemask+0xb2/0x5d0 [ 483.687178][T15976] kmem_getpages+0x4d/0xa00 [ 483.691675][T15976] cache_grow_begin+0x7e/0x2c0 [ 483.696425][T15976] cache_alloc_refill+0x311/0x3f0 [ 483.701431][T15976] ? check_preemption_disabled+0xb7/0x2a0 [ 483.707142][T15976] __kmalloc+0x318/0x340 [ 483.711389][T15976] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 483.717119][T15976] tomoyo_realpath_from_path+0xdc/0x7c0 [ 483.722658][T15976] tomoyo_path_number_perm+0x166/0x640 [ 483.728115][T15976] ? smack_file_ioctl+0x226/0x2e0 [ 483.733119][T15976] ? __fget+0x431/0x510 [ 483.737257][T15976] tomoyo_file_ioctl+0x23/0x30 [ 483.742012][T15976] security_file_ioctl+0x6d/0xd0 [ 483.746935][T15976] __x64_sys_ioctl+0xa3/0x120 [ 483.751595][T15976] do_syscall_64+0xf7/0x1c0 [ 483.756079][T15976] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.761973][T15976] RIP: 0033:0x45a639 [ 483.765848][T15976] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.785443][T15976] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 483.793924][T15976] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 483.801900][T15976] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 483.809853][T15976] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 483.817802][T15976] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 483.825754][T15976] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:38:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:00 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:00 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) creat(&(0x7f00000001c0)='./file1\x00', 0x40) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 484.118850][T15964] fuse: Bad value for 'group_id' 14:39:00 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="fca142b51219ff928f7c2ccf51ef9d827e664930b0bda7d53b34dd43b8b62ce2d8256aad2248887f645054aacca88051294fc19fce8ba8b079e13857c41727dbbdab2090f46097a36c19759b4aa8338c53aaf54400feb27cdcf57f5606b5e539f1eeb4ff632237a10ac05efaa90008f474486657bccb9dd860", @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:00 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) socket$rds(0x15, 0x5, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 484.304989][T16004] fuse: Bad value for 'user_id' [ 484.312782][T16004] fuse: Bad value for 'user_id' [ 485.887977][ T12] Bluetooth: hci0: command 0x1003 tx timeout [ 485.894129][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 487.968652][ T12] Bluetooth: hci0: command 0x1001 tx timeout [ 487.974903][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 490.047973][T10768] Bluetooth: hci0: command 0x1009 tx timeout 14:39:10 executing program 5 (fault-call:2 fault-nth:2): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:39:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000300)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000340)=0x18) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000380)={r6, 0x5, 0x9, 0x1}, &(0x7f00000003c0)=0x10) 14:39:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x40c, 0x80000000002c00) 14:39:10 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r5, 0x400454ce, r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r9, 0x400454ce, r10) r11 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r12 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r12, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r11, r12) getsockopt$inet_IP_XFRM_POLICY(r12, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r14, 0x400454ce, r15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r17, 0x0) r18 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r18, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r18, 0x400454ce, r19) r20 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r21 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r21, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r20, r21) getsockopt$inet6_IPV6_IPSEC_POLICY(r21, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000004c0)=0xe8) r23 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r23, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r23, 0x400454ce, r24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r26, 0x0) r27 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r27, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r27, 0x400454ce, r28) r29 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r29, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r29, 0x400454ce, r30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r31, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r32, 0x0) r33 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r33, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r33, 0x400454ce, r34) r35 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r35, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r35, 0x400454ce, r36) write$FUSE_DIRENTPLUS(r4, &(0x7f0000000500)={0x5c0, 0x0, 0x1, [{{0x1, 0x3, 0xc175, 0x400, 0x0, 0x8, {0x2, 0x7, 0x4, 0x4, 0x62000000000, 0x3, 0x3d9, 0xfffffffe, 0x4, 0x10001, 0x22a, 0xee00, r6, 0x8, 0x80000000}}, {0x6, 0x80, 0xa, 0x2, '/dev/fuse\x00'}}, {{0x1, 0x2, 0x70, 0x1ff, 0xff, 0x6, {0x2, 0x7, 0xb3, 0x20, 0x92, 0x9, 0x8001, 0x7, 0xc85, 0x100, 0x7, r8, r10, 0x800, 0x1}}, {0x1, 0x5, 0x1, 0x7fff, ':'}}, {{0x1, 0x2, 0x10000, 0x0, 0x800, 0x1e, {0x2, 0xffffffffffffffff, 0x3, 0x8, 0x81, 0x6c21000000, 0x25b, 0x8001, 0xe99, 0xdb, 0xffff9166, r13, r15, 0x1, 0x2}}, {0x5, 0x81, 0x5, 0x3, 'fuse\x00'}}, {{0x3, 0x3, 0x7, 0x8, 0x7ff, 0x20, {0x2, 0x4, 0x1, 0x400, 0x9, 0x8, 0xff, 0xfffffffe, 0x101, 0xffff, 0x7fff, r17, r19, 0x200, 0x3}}, {0x0, 0x100000001, 0x10, 0x90000, '%mime_type+eth1,'}}, {{0x5, 0x2, 0x3cd1, 0x251, 0x61, 0x6, {0x4, 0x1ff, 0x6, 0x0, 0x3, 0x3, 0x5, 0xb3, 0x3, 0x1, 0x3f, r22, r24, 0xddf, 0xe}}, {0x1, 0x8, 0xb, 0x5, 'mime_type+*'}}, {{0x4, 0x3, 0x2, 0x7, 0x7, 0x9e, {0x1, 0x10001, 0x9, 0x91, 0x7, 0x3ff, 0x2d4, 0x5, 0x35e7, 0x6, 0x9, r26, r28, 0x3, 0x800}}, {0x0, 0xdc8, 0x0, 0xf8f}}, {{0x1, 0x2, 0x5, 0x6, 0x7, 0x7f, {0x3, 0x3fc0000000, 0x0, 0x0, 0xe, 0x2000000000000000, 0x2, 0x0, 0x0, 0x101, 0x80000000, r1, r30, 0x4, 0x4}}, {0x3, 0x5, 0x7, 0x428293ca, 'user_id'}}, {{0x5, 0x2, 0x9, 0x0, 0x3ff, 0x4, {0x1, 0x7, 0x0, 0x5, 0x6, 0x32, 0x1, 0xd50a, 0x80000, 0x2, 0x0, r32, r34, 0x8000, 0x5}}, {0x6, 0x7f, 0x8, 0x0, '-nodev+-'}}, {{0x2, 0x2, 0x7, 0x401, 0x80fe, 0x4a6, {0x3, 0x5, 0x4, 0x4, 0x1, 0x3, 0x1, 0x7, 0xffff, 0x1, 0xffffffff, 0x0, r36, 0x4, 0x1}}, {0x2, 0x7fffffff, 0x7, 0x0, 'user_id'}}]}, 0x5c0) 14:39:10 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xcf) [ 494.482918][T16031] FAULT_INJECTION: forcing a failure. [ 494.482918][T16031] name failslab, interval 1, probability 0, space 0, times 0 [ 494.537016][T16031] CPU: 0 PID: 16031 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 494.544883][T16031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.554946][T16031] Call Trace: [ 494.558242][T16031] dump_stack+0x1fb/0x318 [ 494.562662][T16031] should_fail+0x555/0x770 [ 494.567085][T16031] __should_failslab+0x11a/0x160 [ 494.572021][T16031] should_failslab+0x9/0x20 [ 494.576525][T16031] kmem_cache_alloc_trace+0x5d/0x2f0 [ 494.581813][T16031] ? hci_alloc_dev+0x50/0x16b0 [ 494.586580][T16031] ? tty_ldisc_ref_wait+0x25/0x70 [ 494.591627][T16031] hci_alloc_dev+0x50/0x16b0 [ 494.596240][T16031] hci_uart_tty_ioctl+0x396/0xa20 [ 494.601255][T16031] ? ldsem_down_read+0x8d/0xe0 [ 494.606030][T16031] ? hci_uart_tty_write+0x10/0x10 [ 494.611064][T16031] tty_ioctl+0xf83/0x15c0 [ 494.615394][T16031] ? tty_do_resize+0x180/0x180 [ 494.620170][T16031] do_vfs_ioctl+0x744/0x1730 [ 494.624937][T16031] ? __fget+0x431/0x510 [ 494.629097][T16031] ? tomoyo_file_ioctl+0x23/0x30 [ 494.634013][T16031] ? security_file_ioctl+0xa1/0xd0 [ 494.639106][T16031] __x64_sys_ioctl+0xe3/0x120 [ 494.643767][T16031] do_syscall_64+0xf7/0x1c0 [ 494.648268][T16031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.654163][T16031] RIP: 0033:0x45a639 [ 494.658038][T16031] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 494.677646][T16031] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:39:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 494.686052][T16031] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 494.694026][T16031] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 494.701981][T16031] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 494.709951][T16031] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 494.717903][T16031] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:39:10 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="3900001a060000000001001700000100cdf0a4fc2910ba6655136c18b3566399f5d3f9bcff3e4065a8aae365a2014db7bfc3eccc198d9db4ae73b183a106da8661ac5b091529189ed093e9a03c8710fca6c931c1b7a03ebcc6784a38d7c20c3e41d84375af28b1bd579338b2b267f9ffe31103b37836b322b29074c0cac1c9d5"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 494.778240][T16031] Bluetooth: Can't allocate HCI device 14:39:10 executing program 5 (fault-call:2 fault-nth:3): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) [ 494.890235][T16050] FAULT_INJECTION: forcing a failure. [ 494.890235][T16050] name failslab, interval 1, probability 0, space 0, times 0 [ 494.906969][T16050] CPU: 1 PID: 16050 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 494.914835][T16050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.924984][T16050] Call Trace: [ 494.928409][T16050] dump_stack+0x1fb/0x318 [ 494.932745][T16050] should_fail+0x555/0x770 [ 494.937169][T16050] __should_failslab+0x11a/0x160 [ 494.942109][T16050] should_failslab+0x9/0x20 [ 494.946616][T16050] kmem_cache_alloc_trace+0x5d/0x2f0 [ 494.951906][T16050] ? hci_alloc_dev+0x50/0x16b0 [ 494.956685][T16050] ? tty_ldisc_ref_wait+0x25/0x70 [ 494.961719][T16050] hci_alloc_dev+0x50/0x16b0 [ 494.966317][T16050] hci_uart_tty_ioctl+0x396/0xa20 [ 494.971340][T16050] ? ldsem_down_read+0x8d/0xe0 [ 494.976108][T16050] ? hci_uart_tty_write+0x10/0x10 [ 494.981132][T16050] tty_ioctl+0xf83/0x15c0 [ 494.985489][T16050] ? tty_do_resize+0x180/0x180 [ 494.990339][T16050] do_vfs_ioctl+0x744/0x1730 [ 494.994915][T16050] ? __fget+0x431/0x510 [ 494.999171][T16050] ? tomoyo_file_ioctl+0x23/0x30 [ 495.004105][T16050] ? security_file_ioctl+0xa1/0xd0 [ 495.009216][T16050] __x64_sys_ioctl+0xe3/0x120 [ 495.013942][T16050] do_syscall_64+0xf7/0x1c0 [ 495.018447][T16050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.024334][T16050] RIP: 0033:0x45a639 [ 495.028231][T16050] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.047860][T16050] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 495.056292][T16050] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 495.064285][T16050] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 495.072262][T16050] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 495.080246][T16050] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 495.088398][T16050] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 [ 495.099359][T16050] Bluetooth: Can't allocate HCI device 14:39:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b70200ff03400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:11 executing program 5 (fault-call:2 fault-nth:4): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) [ 495.230947][T16061] FAULT_INJECTION: forcing a failure. [ 495.230947][T16061] name failslab, interval 1, probability 0, space 0, times 0 [ 495.245341][T16061] CPU: 0 PID: 16061 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 495.253179][T16061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.263377][T16061] Call Trace: [ 495.266707][T16061] dump_stack+0x1fb/0x318 [ 495.271061][T16061] should_fail+0x555/0x770 [ 495.275722][T16061] __should_failslab+0x11a/0x160 14:39:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(r0, &(0x7f0000000040)='\x00\x00', 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000240)=0x400, 0x4) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000001c0)={'batadv0\x00\x00\x00\x00\x06\x00', &(0x7f0000000180)=ANY=[]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pipe2(&(0x7f0000000200), 0x80800) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = syz_open_dev$swradio(&(0x7f0000001b40)='/dev/swradio#\x00', 0x0, 0x2) r7 = getuid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffd5d) setresuid(0x0, r9, 0x0) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r11 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r10, r11) accept$inet(r3, &(0x7f0000000280)={0x2, 0x0, @remote}, &(0x7f00000003c0)=0xfffffffffffffd97) r12 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r12, 0x0, 0x10, &(0x7f0000001bc0)={{{@in6=@ipv4={[], [], @dev}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000001cc0)=0xfffffffffffffeb0) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r14, 0x400454ce, r15) r16 = getgid() stat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r18 = getegid() r19 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r19, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r19, 0x400454ce, r20) r21 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r21, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r21, 0x400454ce, r22) r23 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r23, 0x934, 0x0) r24 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r24, 0x934, 0x0) r25 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r25, 0x934, 0x0) fsetxattr$system_posix_acl(r6, &(0x7f0000001b80)='system.posix_acl_default\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="02000000010007000000000002000500", @ANYRES32=r7, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRESOCT=r9, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRESHEX=r17, @ANYPTR64, @ANYRES32=r23, @ANYRESHEX=0x0], @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES16=r24, @ANYRES64, @ANYRESHEX=0x0, @ANYPTR64, @ANYPTR64, @ANYPTR64, @ANYPTR], @ANYPTR, @ANYRES16=r25], @ANYRES32=r9, @ANYBLOB="29aa7c7f466499ac807abe5bba16563453053a4ded76abed7b955bb1b85e67b5eac762d0cba54518d3cbb24877161c691ba6e65d8d8e9ef4df7b7463825de5537f92707dc61743030376d3dafa75533488b7e05b530e3541173d8118b89755bea0958a2724d0bdd683eac05637ebb25bd0dc9639be63d8af51d9dc9e64e7d355f8661918c45c15f2baf4f024aa5f858d12da79c181f2de365ed06175bdce8d9f9b55", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=r13, @ANYBLOB="02000200", @ANYRES32=0xee01, @ANYBLOB="0400007d01daa2471a3aefc178edbf8c08fa4600000000f2b6", @ANYRES32=r15, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r16, @ANYBLOB="08400300", @ANYRES32, @ANYBLOB="08000400", @ANYRESDEC=0x0, @ANYRESDEC, @ANYRES32=r18, @ANYBLOB="08000200", @ANYRES32=r20, @ANYBLOB="08000500", @ANYRES32=r22, @ANYBLOB="10000100000000002000010000000000"], 0x19, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) write$P9_RLCREATE(r0, &(0x7f0000000000)={0x18, 0xf, 0x1, {{0xf, 0x2, 0x8}, 0x3}}, 0x18) [ 495.280678][T16061] should_failslab+0x9/0x20 [ 495.285206][T16061] kmem_cache_alloc_trace+0x5d/0x2f0 [ 495.290537][T16061] ? bcsp_open+0x51/0x330 [ 495.294882][T16061] ? hci_init_sysfs+0x7f/0x90 [ 495.299577][T16061] bcsp_open+0x51/0x330 [ 495.303761][T16061] hci_uart_tty_ioctl+0x7f8/0xa20 [ 495.308801][T16061] ? hci_uart_tty_write+0x10/0x10 [ 495.313838][T16061] tty_ioctl+0xf83/0x15c0 [ 495.318192][T16061] ? tty_do_resize+0x180/0x180 [ 495.322983][T16061] do_vfs_ioctl+0x744/0x1730 [ 495.327583][T16061] ? __fget+0x431/0x510 [ 495.331961][T16061] ? tomoyo_file_ioctl+0x23/0x30 [ 495.336974][T16061] ? security_file_ioctl+0xa1/0xd0 [ 495.342568][T16061] __x64_sys_ioctl+0xe3/0x120 [ 495.347258][T16061] do_syscall_64+0xf7/0x1c0 [ 495.351754][T16061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.357677][T16061] RIP: 0033:0x45a639 [ 495.361575][T16061] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.381284][T16061] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 495.389706][T16061] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 495.397662][T16061] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 495.405623][T16061] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 495.414115][T16061] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 495.422080][T16061] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:39:11 executing program 5 (fault-call:2 fault-nth:5): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) [ 495.517305][T16071] FAULT_INJECTION: forcing a failure. [ 495.517305][T16071] name failslab, interval 1, probability 0, space 0, times 0 [ 495.532065][T16071] CPU: 0 PID: 16071 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 495.539900][T16071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.549973][T16071] Call Trace: [ 495.553265][T16071] dump_stack+0x1fb/0x318 [ 495.557619][T16071] should_fail+0x555/0x770 [ 495.562057][T16071] __should_failslab+0x11a/0x160 [ 495.567162][T16071] should_failslab+0x9/0x20 [ 495.571697][T16071] kmem_cache_alloc_trace+0x5d/0x2f0 [ 495.576987][T16071] ? bcsp_open+0x51/0x330 [ 495.581394][T16071] ? hci_init_sysfs+0x7f/0x90 [ 495.586066][T16071] bcsp_open+0x51/0x330 [ 495.590220][T16071] hci_uart_tty_ioctl+0x7f8/0xa20 [ 495.595330][T16071] ? hci_uart_tty_write+0x10/0x10 [ 495.600778][T16071] tty_ioctl+0xf83/0x15c0 [ 495.605097][T16071] ? tty_do_resize+0x180/0x180 [ 495.609860][T16071] do_vfs_ioctl+0x744/0x1730 [ 495.614440][T16071] ? __fget+0x431/0x510 [ 495.618591][T16071] ? tomoyo_file_ioctl+0x23/0x30 [ 495.623524][T16071] ? security_file_ioctl+0xa1/0xd0 [ 495.628761][T16071] __x64_sys_ioctl+0xe3/0x120 [ 495.633573][T16071] do_syscall_64+0xf7/0x1c0 [ 495.638088][T16071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.644023][T16071] RIP: 0033:0x45a639 [ 495.647903][T16071] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:39:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 495.667514][T16071] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 495.675947][T16071] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 495.683906][T16071] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 495.691889][T16071] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 495.700005][T16071] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 495.707974][T16071] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:39:11 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$KVM_GET_PIT(r3, 0xc048ae65, &(0x7f0000000200)) mount$fuse(0x0, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000040)='fuse\x00', 0x224828, &(0x7f0000000340)=ANY=[@ANYRESDEC=0x0, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:11 executing program 5 (fault-call:2 fault-nth:6): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) [ 496.050642][T16096] FAULT_INJECTION: forcing a failure. [ 496.050642][T16096] name failslab, interval 1, probability 0, space 0, times 0 [ 496.094773][T16096] CPU: 1 PID: 16096 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 496.102734][T16096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.112796][T16096] Call Trace: [ 496.116117][T16096] dump_stack+0x1fb/0x318 [ 496.120442][T16096] should_fail+0x555/0x770 [ 496.124852][T16096] __should_failslab+0x11a/0x160 [ 496.129787][T16096] ? kasprintf+0x6a/0x90 [ 496.134022][T16096] should_failslab+0x9/0x20 [ 496.138521][T16096] __kmalloc_track_caller+0x79/0x340 [ 496.143811][T16096] kvasprintf+0x70/0xf0 [ 496.148059][T16096] kasprintf+0x6a/0x90 [ 496.152116][T16096] alloc_workqueue+0x52d/0x13e0 [ 496.157245][T16096] ? vsnprintf+0x1b6e/0x1c00 [ 496.161842][T16096] ? vsnprintf+0x1b64/0x1c00 [ 496.166419][T16096] ? vsnprintf+0x139/0x1c00 [ 496.170927][T16096] hci_register_dev+0x1a6/0x720 [ 496.175769][T16096] hci_uart_tty_ioctl+0x8ad/0xa20 [ 496.180803][T16096] ? hci_uart_tty_write+0x10/0x10 [ 496.185840][T16096] tty_ioctl+0xf83/0x15c0 [ 496.190188][T16096] ? tty_do_resize+0x180/0x180 [ 496.195001][T16096] do_vfs_ioctl+0x744/0x1730 [ 496.199574][T16096] ? __fget+0x431/0x510 [ 496.203725][T16096] ? tomoyo_file_ioctl+0x23/0x30 [ 496.208651][T16096] ? security_file_ioctl+0xa1/0xd0 [ 496.213752][T16096] __x64_sys_ioctl+0xe3/0x120 [ 496.218428][T16096] do_syscall_64+0xf7/0x1c0 [ 496.222949][T16096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.228829][T16096] RIP: 0033:0x45a639 [ 496.232707][T16096] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 496.252301][T16096] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 496.260697][T16096] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 496.268663][T16096] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 496.276619][T16096] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 496.284690][T16096] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 496.292658][T16096] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:39:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x40d, 0x80000000002c00) 14:39:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000203400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:13 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$USBDEVFS_RELEASEINTERFACE(r2, 0x80045510, &(0x7f00000001c0)=0x200) 14:39:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x934, 0x0) vmsplice(r1, &(0x7f00000015c0)=[{&(0x7f00000005c0)="985d95cd94fe85210d1fcce4e85e395d9a968e26ae1b5fdf7896bad347a9699ffb6f028c8ec4fc6b60945b99a7d97d01982dec200a96e8d4b311c98a1e12963c7a286fc61146cfa9e3a3ddd808d42e36177fb2a08c39cdc5a9272da215917890905e094b1c77ffdc44abe16577bcccea7c7253c73b68fc20d4c210d67486fbc5bd77fd10a95039617125830a150a89df067830e36d3c35f56f77f80604d393a9f986f4b0a213e19fc89096fb09d593ec64523dbe6448994d92ed0fbc56b6c3eb9c8afaa2a90c431a1f61deef8c6e73278030b105db5f9b45b303681d633bc11ac1bb20d331d2585abcc66936fe9d4a6fc28e1b9561cd3fe42eb880e2671bc615120fe389463ffd0f331b36efd90c5b4f6f75d653de6e90afcef6909d498298624bb01a4c8eb5bc8e5a52de2ffac7a7213834f1632b7ee8ebc58a0c3045919d19a1c779329e6990e7bcfdc26f674249436cbf05e2a6df3da16a905a5b54a38513752e87f39de5dfe2067fc04fdd99edcb5e85b5176bc0cbcc7953037f79ccdb487431d0829898a9021d28a04f78ef841c2b24e14809c9c3ba4709fb3636a79d9a84d0c7137afe685c457f644c04c9e22be8b4f3c23f3f7e88c9c8b9627639b8620b53a359994864a0b2c04ef02ed58cc9ce4f8fab13bf520fb75f50a2211bb7e951dff35ad441db3be99c7e2f17e286f80277179ed4ade116ad329fccce5f6e15fc871afd2472f938feb7fb07ed8b53ffafbe4a94d9b104872b535996f31b228613e6171897b39e9a8a444b24345431d1236fe3495d98fb5ab6fe8ffdb6a5e0644eaa31e1b4972edd3006c094ab8e18575f98b75f85e5f204d47acd069c62bfe1a1028d9ae02b014bc0377442b98d0020aa0455350ffcc55879c05207f94739e93a611144db672b2b61d4ecaa58f6ce73766051da19816c5d13e6b3be620e2cff459beaf38ed872a75d24e2040a65deb51a3670534d48c31184732279dd7c59728af2000f393f1cc334ab2d311e422434d45e1adec295693963c297c2762a9a4941cc5f39fc4c20c4343a6a66adaafbbe6281c3609609364bb3e1a38302aa8b807ff727bab2b54ca9a6442ea9a1624cd2673a457e46bec08c250d7351bdb176ef8aaa61f4a11dcb24e90943e6056743a3b6c5ecf37832f8519ef261af60f56ff38c4442151bb5f2b7201f358d9b0115a2f3694093aef47c5c96b1e827b071a32a664321fd9f82f426200a6aa613f7b22f5678566b0971dbcf4151d5bdc552f04cd0c550e3eacc8b20aa57f04dcfa068711e2cc43dc2c452f1b66d04323bf60f703aef93f044a968295ad6561b01ab5299bf4b7d91d3cc7add37b78036a78f7854e4a1290e392d2bc99144c2ff13cb48b8f83f0a6cd0050b9516372aa6fdfa8b9865a5e0b3776b978661041210b2fa47c56e23146802bf0768ce3070a00e4a457f8e29953d5ffe667bca172da74ce5d5743573b967fa313e167160a6a4e259c457260b93dec7ab5f724d74fda2264a7a453e1a5674b4f32c82843aac6402bc509482aa20c034536ee2ee1d227991e7ee726aa4e216c3fdcca0eac0eb04ed091611290d676506a72d7a1491b8d6b3037153e8b1d7fbafa40a207979a15ec2357ec5156e90ed1ea70c65148c750912f62413bbb40ead7ce626411e3955a7f3af04b71c500d79d5f0a283f77602afc0534d6e08f24f18d537ae3da328ddf27ec08df49b4ce55ebcd4173b15abfa3ac4a8b0225839d7380afe85a48ae44cbc464cb4831a0a84e6d4fc316d6903e1829dcc6d01f9b780fa35e3c9ab6d15c3741fdefa8c605816a3417566648cb0347a05ec005fb5fe7de2862210eaeeec910b24a6575f663682f3a616f472c19f91c5e7068e99b540ea557430e4c335e43673cdc194bc119e5452c1d4b761bdeea0590ffd7bb215450bb7c96a9e21c391a025231d676e6a925f95cc10a772e4186a8d6639dc7e4c6e8bad24c634528887e276872af2fcfd49a678187ac8f329bd5fa6c505d8348b0161081f17f9aa58753bd6fe82e9b057feca2a636f9d476154c7f1a80852f8215de3bc6e514d3834df9eb321647eb4b22aefee9bca5dcf470ecff0ea30efe36cf1b8efd097a4598cea69c08cb4f580e7a91cc204951e30fc7b321c5cafbed3afdf4746aa26ede7db6e361d78ac3ca8f18da8c4a49e0c2381c330c41f7278b9d7dee9e970bb539d1c0ce6dc0a7e41e401df0cb610b1eca12fb1eba4d66d5f4f9f70a253f8b2ab0baaec468fbf739ff43e96f461c10cb745c747f5e96e148702df26075612c83c85912e8fafa4547d09dcab836ab530e56838f139ed0af8919de123fa59c60a2619d38abd4ce72b900289df4d5358833981c6862a09c0026f311753be5a6c45fd4d2dd621616315995bdfabc1955c8df9e8c77aefcdbdedf454553a158d272f0f88084d58b4fbbf1a7b0588c2ea649bcc62caecb552b693b7666589259e92a5ead748e96c912668f60552fdded796dcfdb8e602f37cb6b0c8b035f65698a82bd73d6a522325cb6166da23bd591c374da9e55edd1ef771c61b459a41a67dfc53dbb04c5eb6ae85ac661305bd3ca6bd88f668491746ab85baa1991ed81817b5955677857c6d32f18bf179592356764f291f150f8c6fe45c2c7499acbf9129458ab8255b8abb14c768a1e85af5ca48cc782dc936c6a8959ba4b43307598e098cc61ad454c9fd5e946158f8d36416a16fbb7ce8b8654fa55375c446437435c2843d466e65fdf9f7ca54be81d06ba5802f24a6ba3cce30305fdec8afa0ea628bfffaaebd7a689f12ea255c5ee7b4d0e19dcea2f3a072dabeedd83d66ea9136e6b098ee54eaad633c7ca98fb4b00c023d195b991494a88f3297fe9d8106b306feee9087562e21d8f2fea06120aeff20ba07467238913143cb2e1d5988370779c76e8586dec4fd903f5bef7acd6f8a304247592223bf1b4fa0df7590d304bdac0d3e62e18253b3d7d35f7a3b89433a9a1dadd4c652f2b798cae1af5fa058a16a019d3d11fa8345a9e89098d46626548335c752ae3ae88b4fdb863f2179c644df3a031f164ad61da2b314dd89b51214109ebb79674a86406ed4ccf3b1f76876b70e531bc627d4fff40f18f26a03dc38d6f6ce3b830db65ae6680c52569da7d7c1b8486caa38e8cb7dd585dce7a45b235418bbe563e7aeb356aa0b7bc23d82e10e96ebc4e8757e5ebec1e97edac74637e48f6aea19b5da14b6233fecdba7086f676f8316a9c7eab50af347305a7c2dc848638be8784ed11def96e0f2f5b75bc48c48e917ce7a86eae63e8b48995e11faf1dd633ae750cb7a4f47d31256e0579428c3e832306b0c2cad7508d57be2d1e39543e93c1ac78547308e84272b707f9ad34348851230a515dd642b488a835eb1bda14e472270d8a13d1baeacde6fa7cdd28088a202fa999e39d587ed53273603ea9dc2f98860621cc8276eb576a78e2b2cc63411f0edc6f4725f60bd6d0b1bbfed06387330d6b344e3513c8d8b16c26d611b818660de98716faed0ae3ab193711f8d317635e0fe916119793910effde92de1ded6bab8b0ac12ea0c637496a198827d5168aca1dace031137aec41e3b7cf968ccb0587fb3d40c8178fd6dab12aeef969329d1e5961be669d10fe0fa669054475d3aa5f3b7712fd9bb3c51dc6c2ba52a178c0a6fec61a9d416c8af83ef47e1a275528fd1fd2eb7cbf063c707ec5ad2421e8146c5139b5e4474a5578195d8e183d4709248e95d392e2fe647d9709f54db89babea462e8e10b8184d1c28ad7792b27d425e66d69e1980b287a4df9d80f1ad9aac5c216e83f194b18c158e5e31029ffa37cdb143af027a1a93eb9e22948da9afa64e3a45ebe540fbf5ec6ad85c08a434a6eb31b5d2c74e910f3b26a46a3296d30c04969e84df6eef22700f672ac23ad48c00bfda04575f603ef23040e88e95b462040f81e80dedebe5bdc0d59a7d699188f81a0cfdd1b04a1b1a1561273c8a44fbe0eda9a3d19d3cf9b1583d36638023d61bab113f06c46b9b43b1ebba9102dc12154a60d1b3a557e7ad3bd7ac291eeff0188cdab229352f18ff6bbd4d74b8c8e076ae6b452f6b8cb0acf7753c95559c749317b1e8ea675ce22854ade3b6d6c4dbf6365d8f31a21249ea39efce83ef25734448e48276c541be2e2bc7cb5dc660f25f161bcb1b4ab6209d2e1229bf74c0a16d1eec35d47eec6fa923b7a27f965196b022244c8754fcc1abd53b66c905fad2a09f981c2e99d9a42bc786a270fd166ba47545978da21c7809b7f3cc62bcc702a5ae8a3bdd4e3411a5e04e10f6e1d35a92228c6c8b32a6dab7d4e31d4bcfb4b33e7346b7ee09b4bc9769cfa60e04ac9ee43c5842019a88fb8740fb82ef44f052d578049480dc70d802e87a36197ae381d5f4b122d6aa657a9b1254b9d87e6e779d100b9f8279ec9141c6c3ff813f99aa0dc57d1bc5a411610cb72b53da3fce50ebb3ff335cbf425771c7d66ea5c7f2aaddf4c618860b556c889159e2698a7114076d494b1af5672000ace4327ffcafdc721a5371c3d35039ed22a9e1f2a2ff6e123201888a1177369f52cb464ba7992cf2a6d4c07d1ed4647906a1dfefb6af76154605c73f85c97a68a5da891f54b1d518cf2db8d446e6e5ccd93f1964ee4f74c27b136f184039b1579738f569fd69233404227bc08eda49aff41140a0e129a11bd5c19ed6a5d69278da7960b6eb7602fd845f3c08e9ff91277fb5d84a32ab87d0aa0f1f80a2a9c4222bab2e19c24104e973fcd3f3700ef0e76a033c60fdf6e441b009188246d957aaebfad35f8ce072772f08097d6e5f9a621751316912b891c41ac34edc1fcf3b767dde57de1f3baf4e8557c0c089a8f3afaf0e39eed9ae0e55ef23dcecf1a6a91e744beae535ac966e784efcf072dd046bd8490d415fecb8695ccc8ca6e2fc4f95aa701e9acb93660c7d7720f416d2242e149f609bd82c2c44a48fcf37da00fcb926ea58b6a49295bc62d5476941cfa3a448745e6844d7f62e0d51948e15f5150194a48cefd5d0ae9aee462ea9de60c6ef69b0f86a3aaec6421049f6fabcee836d67a690e6f277d9c3302258f3d3777277b4313276a1ce26a295a08dc5d28e2b58ae2226d5609e400d16319cc19d2aa37c25f80deae0c4f6a363afda222781a4d1257b0a1e44588916de1c944b3921813c9df936a304401ee5cdd6f603322af6f421bd5f3605a1acce1c5cc4e9651b467c61f0bdacde6201274319d8ad4161bbec29d527b4d26b840317020a77426c41bb632e146953ad39a66a07c176dd042edb2fd7da4ceb09fa8dd6689230c843f906c0fe4a5e591c7f19fbb0c3d0366e43ec047335389e82fa111acd05da8d36899e130953e337c89a02f5bdf03cd071d040888ae45b08115a10817f1577de4fe237bb76973fdf33e2d09c76d04021050029aabffc9ff367916d16e0c715cf11678a1f37865786789d2fc90751eebd4de028424d50972886d6f5c05e74c4acb84af497c7870514e560cb108549dd0b5e723ab51b620b5403f90ac5df7058fc7131a8f2662beb47e5646ee86cf33a11cbaa6ba5fea02229073da334f9dfd002d35266ba0a0791e18d7246dd3bdd7783293d6217901a7ffdd35b8514271d48ac324925ef564615abc6ad341c2f9441509a172db6467d9159c62458be63853fc67766362c6130ed057cce05412544a1fff3ca76d518dc698a085b0461bc715d892a1de2fa4e621ed6acd8d944e7aa07813654fdd9fdfe898fce270241f2be6309e4edb89995cc4447c08aa6dd0e2608742de58cb", 0x1000}, {&(0x7f0000000180)="2d345406047bd6ae712452314b91b4bd4bc2fac45f", 0x15}, {&(0x7f0000000340)="116cbca8e7477fe3aea2c2500050060a3be60e2389ca0a5957f2ea4d44764dc8ab9c1c9df9924b76ce5c3705f114f2f184dc23debfbad859caa1a461944ccda2d477fee995f834d2e6321b8a4814150c6a184335e9ce87551e04fa9d343b2cfb25e2e3bf088d0df7830219a98786a0d7a9236a5536a257b0b44e476bf24fe4944da51036e90f9648a6", 0x89}, {&(0x7f0000000400)="b50a06acd72d1d6a526fcf981d168abf23fa476b76abd7b97f38ba7369ea24ada52060ea9bd36703c7792c5aadb9b3fae1e4a69c2bf351637c811f3447a5abfefeb4f5eec63c2e1c82bfe674236c974811a03699b7728b00d9063d2b74e324e511f6f3efe4c6d24a68af2286a7f526f3c111b9d915566313797fe43ea67a630c70302b0a5c7a059dd97d85b2603742f2abdf54d41158ea17ab380fbadb6c93f26536cdcbadaabf97556206486a0d8940cc5f18f502d4debe89bf83d88f44b876d0a0bd2994ebf09fdc0d5dad396f04181bbe3201e0491b", 0xd7}], 0x4, 0xa) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="390000060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000240)={{0x4, 0x0, @identifier="6a64cee00ea3d85a2ac5ca339fdc0f07"}, 0x82, [], "325dfec064ac20aa0c8838ea4c010e04da4fcf8d056a1f364d3fd3078e0d316c840555d0c322efd328bc71222787e81e8382226aae1b4dff31d2728d72ace724b7dbde2bc32d2be1023bc9a9e7052771f1fec55c153b83918c441e45de49b2a5dafde1d93e0173fd613aeaf88ec070df1937b7c0da0d48fa6a79f987be4b04e05006"}) 14:39:13 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x2, 0x100) readahead(r0, 0x7, 0xd1) mkdir(&(0x7f0000000040)='./control\x00', 0x0) chmod(&(0x7f00000000c0)='./control\x00', 0x9c32f69e6caa24eb) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000001440)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r5}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f00000013c0)='security.capability\x00', &(0x7f0000001400)=@v1={0x1000000, [{0xbcb6, 0x7}]}, 0xc, 0x3) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$UI_BEGIN_FF_ERASE(r6, 0xc00c55ca, &(0x7f0000000100)={0x2, 0x8000, 0x80}) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001600)={&(0x7f00000015c0)='./file0/../file0\x00', r6}, 0x10) getsockopt$inet_sctp6_SCTP_STATUS(r7, 0x84, 0x6, &(0x7f0000005580)={r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, &(0x7f0000005640)=0xb0) lsetxattr$security_smack_entry(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)='security.SMACK64IPOUT\x00', &(0x7f0000001580)='vmnet1\x00', 0x7, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000001480)={r9, 0x20, 0x5}, &(0x7f00000014c0)=0x8) mount$9p_xen(&(0x7f0000001640)='selinux-*\\self[mime_type\x00', &(0x7f0000001680)='./file0/../file0\x00', &(0x7f00000016c0)='9p\x00', 0x10, &(0x7f0000001700)={'trans=xen,', {[{@dfltgid={'dfltgid', 0x3d, r5}}, {@msize={'msize', 0x3d, 0x3}}, {@version_u='version=9p2000.u'}, {@access_client='access=client'}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x8000}}, {@cache_none='cache=none'}], [{@subj_role={'subj_role', 0x3d, 'security.capability\x00'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@euid_lt={'euid<', r4}}]}}) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f00000002c0)={0x40, 0x0, &(0x7f0000000140)=[@acquire={0x40046305, 0x3}, @decrefs={0x40046307, 0x1}, @increfs_done={0x40106308, 0x2}, @increfs, @increfs={0x40046304, 0x2}, @increfs, @enter_looper], 0x1000, 0x0, &(0x7f00000003c0)="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"}) 14:39:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000240)={'filter\x00'}, &(0x7f00000002c0)=0x78) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r4, 0x934, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000200)=ANY=[@ANYRES64=r4]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000180)={{r6, r7/1000+10000}, 0x11, 0x4}, 0x18) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r8, r9) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r11 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r10, r11) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300)={0xffffffffffffffff}, 0x106, 0xf3c7e2e8a4d1ca63}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r8, &(0x7f0000000380)={0xf, 0x8, 0xfa00, {r12, 0x12}}, 0x10) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 14:39:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000403400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:13 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030303430300e302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB='-\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 498.040134][T16141] fuse: Bad value for 'rootmode' [ 498.056267][T16141] fuse: Bad value for 'rootmode' [ 498.377813][ T22] Bluetooth: hci0: command 0x1003 tx timeout [ 498.383938][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 500.448063][ T12] Bluetooth: hci0: command 0x1001 tx timeout [ 500.454377][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 502.527858][ T22] Bluetooth: hci0: command 0x1009 tx timeout 14:39:22 executing program 5 (fault-call:2 fault-nth:7): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:39:22 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) ptrace$peek(0x2, r2, &(0x7f0000000300)) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x50000, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f00000002c0)={{0x4, 0x2a, 0x7, 0x80, 0x6, 0x5}, 0x2}) 14:39:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:22 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) fspick(r2, &(0x7f00000002c0)='./file0/../file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:22 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) ioctl$VT_WAITACTIVE(r1, 0x5607) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) setsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 14:39:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x40e, 0x80000000002c00) [ 506.613851][T16165] FAULT_INJECTION: forcing a failure. [ 506.613851][T16165] name failslab, interval 1, probability 0, space 0, times 0 [ 506.642394][T16165] CPU: 0 PID: 16165 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 506.650406][T16165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.660468][T16165] Call Trace: [ 506.663785][T16165] dump_stack+0x1fb/0x318 [ 506.668124][T16165] should_fail+0x555/0x770 [ 506.672548][T16165] __should_failslab+0x11a/0x160 [ 506.677679][T16165] ? kasprintf+0x6a/0x90 [ 506.681924][T16165] should_failslab+0x9/0x20 [ 506.686425][T16165] __kmalloc_track_caller+0x79/0x340 [ 506.691802][T16165] kvasprintf+0x70/0xf0 [ 506.696017][T16165] kasprintf+0x6a/0x90 [ 506.700088][T16165] alloc_workqueue+0x52d/0x13e0 [ 506.705893][T16165] ? vsnprintf+0x1b6e/0x1c00 14:39:22 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0xa5) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) setsockopt$inet_dccp_int(r2, 0x21, 0xa, &(0x7f0000000500)=0x251, 0x4) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, r5, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r5, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x400}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff9702}]}, 0x24}, 0x1, 0x0, 0x0, 0x400c854}, 0x10) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66643d9b07d7d1d911e8b3d7a7f74cb059d80d7ef910c81387a38ecbd80d96526b93aa1c3b831a4304df7baba132378a6a863447d27c5079c8ef", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) prctl$PR_MCE_KILL(0x21, 0x0, 0x2) r6 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x401, 0x80181) faccessat(r6, &(0x7f0000000300)='./file0/../file0\x00', 0x0, 0xc00) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x4001, 0x0) r8 = accept$ax25(r6, 0x0, &(0x7f0000000180)) flock(r8, 0xc) ioctl$KDDELIO(r7, 0x4b35, 0x4983ff8e) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r9, r10) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000240)={r10, r6}) [ 506.710569][T16165] ? vsnprintf+0x1b64/0x1c00 [ 506.715151][T16165] ? vsnprintf+0x139/0x1c00 [ 506.719658][T16165] hci_register_dev+0x1a6/0x720 [ 506.724516][T16165] hci_uart_tty_ioctl+0x8ad/0xa20 [ 506.729538][T16165] ? hci_uart_tty_write+0x10/0x10 [ 506.734561][T16165] tty_ioctl+0xf83/0x15c0 [ 506.738910][T16165] ? tty_do_resize+0x180/0x180 [ 506.743696][T16165] do_vfs_ioctl+0x744/0x1730 [ 506.748305][T16165] ? __fget+0x431/0x510 [ 506.752558][T16165] ? tomoyo_file_ioctl+0x23/0x30 [ 506.757752][T16165] ? security_file_ioctl+0xa1/0xd0 [ 506.762858][T16165] __x64_sys_ioctl+0xe3/0x120 [ 506.767523][T16165] do_syscall_64+0xf7/0x1c0 [ 506.772013][T16165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.777900][T16165] RIP: 0033:0x45a639 [ 506.781774][T16165] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 506.801362][T16165] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:39:22 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i$=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 506.809759][T16165] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 506.817799][T16165] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 506.825761][T16165] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 506.833734][T16165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 506.841700][T16165] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:39:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 506.924283][T16182] fuse: Unknown parameter 'group_i$' [ 506.955844][T16183] fuse: Unknown parameter 'group_i$' [ 506.976629][T16185] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 507.000287][T16185] fuse: Bad value for 'fd' 14:39:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000d03400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 507.545692][T16191] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 507.566518][T16185] fuse: Bad value for 'fd' 14:39:23 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="39009a8decc7ca45a2d479ff1906000000000100170000f3c9725c6455d4a1e41544e79869cd000000"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 508.931069][ T8067] Bluetooth: hci0: command 0x1003 tx timeout [ 508.937444][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 511.008087][ T8067] Bluetooth: hci0: command 0x1001 tx timeout [ 511.014480][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 513.088176][ T8067] Bluetooth: hci0: command 0x1009 tx timeout 14:39:33 executing program 5 (fault-call:2 fault-nth:8): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:39:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:33 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:39:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x342) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c02) 14:39:33 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="75705f69443d00000000042fbc7669beef6ad28183e907e489bc8ff57d8bcf402e92ba831555dc0921680308319b4f4c9f968222a66c5fef49934c1e4f3f7eb0cc1b09de807fef8eaf69538bc09cd305ba9dbe38c8b8a7bb4fc23215511d0bdef785b975a8875c0f9ef9622b0602d70b707477f7465c58e30c015459fca1ec666001103f5fee1a82fbfbf09b6542387aeec667d38565dd406b19465ae2d0efee41611db8761a73660eda56757cbbe3abd6ecec9f41b53b09c2cb18b681d2a3003c9fdb7d", @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f0000000340)=""/66) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x42, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000002c0)={0x3f, 0x0, 0x2, 0x991}) ioctl$DRM_IOCTL_AGP_BIND(r4, 0x40106436, &(0x7f0000000300)={r5, 0x33ba}) socket(0x11, 0x80000, 0x4) [ 517.453925][T16221] fuse: Bad value for 'user_id' 14:39:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f00000002c0)={{0x0, 0x0, @descriptor="19b6f23e9a4fc59b"}}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f00000000c0)={0x1, 0xf000, 0x5, 0x0, 0x8b}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 517.500457][T16228] FAULT_INJECTION: forcing a failure. [ 517.500457][T16228] name failslab, interval 1, probability 0, space 0, times 0 [ 517.529491][T16228] CPU: 0 PID: 16228 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 517.537352][T16228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.547593][T16228] Call Trace: [ 517.550889][T16228] dump_stack+0x1fb/0x318 [ 517.555226][T16228] should_fail+0x555/0x770 [ 517.559648][T16228] __should_failslab+0x11a/0x160 [ 517.564585][T16228] ? kasprintf+0x6a/0x90 [ 517.568824][T16228] should_failslab+0x9/0x20 [ 517.573329][T16228] __kmalloc_track_caller+0x79/0x340 [ 517.578701][T16228] kvasprintf+0x70/0xf0 [ 517.582863][T16228] kasprintf+0x6a/0x90 [ 517.586932][T16228] alloc_workqueue+0x52d/0x13e0 [ 517.591785][T16228] ? vsnprintf+0x1b6e/0x1c00 [ 517.596403][T16228] ? vsnprintf+0x1b64/0x1c00 [ 517.600989][T16228] ? vsnprintf+0x139/0x1c00 [ 517.605495][T16228] hci_register_dev+0x1a6/0x720 [ 517.610353][T16228] hci_uart_tty_ioctl+0x8ad/0xa20 [ 517.615374][T16228] ? hci_uart_tty_write+0x10/0x10 [ 517.620406][T16228] tty_ioctl+0xf83/0x15c0 [ 517.624743][T16228] ? tty_do_resize+0x180/0x180 [ 517.629517][T16228] do_vfs_ioctl+0x744/0x1730 [ 517.634105][T16228] ? __fget+0x431/0x510 [ 517.638267][T16228] ? tomoyo_file_ioctl+0x23/0x30 [ 517.643204][T16228] ? security_file_ioctl+0xa1/0xd0 [ 517.648425][T16228] __x64_sys_ioctl+0xe3/0x120 [ 517.653248][T16228] do_syscall_64+0xf7/0x1c0 [ 517.657756][T16228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.663654][T16228] RIP: 0033:0x45a639 [ 517.667536][T16228] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.687235][T16228] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 517.695650][T16228] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 517.703608][T16228] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 517.712261][T16228] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 517.720313][T16228] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 517.728294][T16228] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:39:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="3900001a06000000000110170010dd6ecf29aea417822f021a00f27ec45d282c674b325f219f3669357513e6ef2e8f641826172b16bb2d4a6ffba66b2440"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x7ffffffb, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xfb], 0x0, 0x181110}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PPPIOCDISCONN(r0, 0x7439) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x22001, 0x0) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) ioctl$UI_DEV_DESTROY(r4, 0x5502) 14:39:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000f03400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:33 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="737d0011060000000000001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 518.003329][T16233] fuse: Bad value for 'user_id' 14:39:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:34 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c03) [ 519.817810][ T22] Bluetooth: hci0: command 0x1003 tx timeout [ 519.824065][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 521.887854][ T22] Bluetooth: hci0: command 0x1001 tx timeout [ 521.894051][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 523.968197][ T12] Bluetooth: hci0: command 0x1009 tx timeout 14:39:44 executing program 5 (fault-call:2 fault-nth:9): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:39:44 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c674766593f62a4ba5506cc1d852a53ce67643d", @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 14:39:44 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback, @local}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000200)={@multicast1, @local, @multicast1}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xfffffe5b) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r9 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r9, 0x934, 0x0) r10 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x401, 0x101000) dup2(r10, r8) openat$cgroup_ro(r7, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) dup2(r5, r6) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) r12 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r12, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r11, 0x84, 0x6, &(0x7f0000005580)={r13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, &(0x7f0000005640)=0xb0) 14:39:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:44 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x802, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x0, 0x455e7b22}, 0xc) 14:39:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c04) [ 528.344020][T16289] fuse: Unknown parameter 'gGfY?b¤ºUÌ…*SÎgd' [ 528.395703][T16289] fuse: Unknown parameter 'gGfY?b¤ºUÌ…*SÎgd' [ 528.404331][T16297] FAULT_INJECTION: forcing a failure. [ 528.404331][T16297] name failslab, interval 1, probability 0, space 0, times 0 14:39:44 executing program 2: prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000400)={0x1, 0xff}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="17a34f347c807aec64244898b14a2ae148e3c0451a887ad185f132a24f4c00000000000000000ce705efc22e3b7a12c5208594bd77afa847c3e5783b4de24e8d28e1099e27a6fbd283422e74e096992fb82c263d5796fb20eb8be4575e92e08799b9124adf6c5268b45b4d870dac9903ae75ec6fc2709c6430d52db1ad", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="03000000fbff0000653d3c89e5339054ede3ed2282b7b3e9b5544f517f88210220d794b319bdf6db18840838d82a0da801263d98673fb8668f7c9e47cb9e21215a887a7b89c27c1370b18aaabdceb8de907abc91f375945fee54882a3aac2b8e1e498f7d52c7929c202924eac3aebbfcf725c974eb270c8acc14fae7f2a242235c6b9dd39fac7304004948331eaf3298b4985e0052a8", @ANYRESDEC=r3, @ANYBLOB=',\x00']) r4 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x7, 0x200) ioctl$PPPIOCSMRU(r4, 0x40047452, &(0x7f00000002c0)=0x8) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r5, r6) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000380), 0x4) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x84800, 0x0) ioctl$VIDIOC_ENUMINPUT(r7, 0xc050561a, &(0x7f0000000240)={0xffffffff, "32d1ad7a54db3dbc9bc7e4401b2cca16457fc253e9a7798b677465f305e9fa58", 0x0, 0x7, 0x5, 0x0, 0x80020, 0x2}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000500)={0xffffffffffffffff}, 0x0, 0xc}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000580)={0x7, 0x8, 0xfa00, {r8, 0x1}}, 0x10) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 528.468411][T16297] CPU: 1 PID: 16297 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 528.476281][T16297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.486435][T16297] Call Trace: [ 528.489734][T16297] dump_stack+0x1fb/0x318 [ 528.494082][T16297] should_fail+0x555/0x770 [ 528.498518][T16297] __should_failslab+0x11a/0x160 [ 528.503473][T16297] should_failslab+0x9/0x20 [ 528.508001][T16297] kmem_cache_alloc_trace+0x5d/0x2f0 [ 528.513274][T16297] ? apply_wqattrs_prepare+0xe9/0xab0 14:39:44 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040), 0x1000, &(0x7f00000005c0)=ANY=[@ANYBLOB="6664273e8d3d", @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d10303030253030303030303030303030303034303030302c757365725f69643d7ada43e2d110b56e82978d8993a387f71830d138070217b9659d755971f1cd64895f9da24e39b70ad27547574e393c231c3b149a537644e7ed4bdae83fbb24eb8d9145bab2da0748031cf34830fa6b3b20d7f7ea2a0884930bdad068e87be0890305d7cb7647b6a496666f13366e733f18ce868c7ad15bb23bf87544ef769c62596b8789cde573f0cdf2f152edd5755ba48ac9277ca85dce381ca601272d4db1", @ANYPTR, @ANYBLOB=',group_id=', @ANYRES16=r0, @ANYBLOB="73e7390df43127b6a2edafaebf07efa6d20d0a636646e75106e5f171c99364b1a768bdbcc2368d3c5563775554ebd83ed6553b48142a2e89eb9460430774b75eb994cbd6b930e978ca2936aef7c8b969cef35ce76c6ec4964b4dc2b64786033e4698026dd06e8dad6c2d9344189565de3e9486c1b44f509103e2775dc0ab82638a610c3cdc27d79a"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r4, 0x400454ce, r5) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r6, 0x400454ce, r7) getresgid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r9, 0x400454ce, r10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r11, 0x400454ce, r12) setxattr$system_posix_acl(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x5, r0}], {0x4, 0x2}, [{0x8, 0x1, r3}, {0x8, 0x7, r5}, {0x8, 0x5, r7}, {0x8, 0x2, r8}, {0x8, 0x2, r10}, {0x8, 0x2, r1}, {0x8, 0x1, 0xee01}, {0x8, 0x4, r12}], {0x10, 0x4}, {0x20, 0x3}}, 0x6c, 0x1) [ 528.513341][T16297] apply_wqattrs_prepare+0xe9/0xab0 [ 528.523931][T16297] ? alloc_workqueue+0xdd8/0x13e0 [ 528.529083][T16297] ? trace_lock_acquire+0x159/0x1d0 [ 528.534302][T16297] apply_workqueue_attrs_locked+0xc5/0x650 [ 528.540122][T16297] alloc_workqueue+0xde5/0x13e0 [ 528.545008][T16297] ? vsnprintf+0x1b64/0x1c00 [ 528.549621][T16297] ? vsnprintf+0x139/0x1c00 [ 528.554137][T16297] hci_register_dev+0x1a6/0x720 [ 528.559304][T16297] hci_uart_tty_ioctl+0x8ad/0xa20 [ 528.564331][T16297] ? hci_uart_tty_write+0x10/0x10 [ 528.569351][T16297] tty_ioctl+0xf83/0x15c0 [ 528.573866][T16297] ? tty_do_resize+0x180/0x180 [ 528.578646][T16297] do_vfs_ioctl+0x744/0x1730 [ 528.583227][T16297] ? __fget+0x431/0x510 [ 528.587404][T16297] ? tomoyo_file_ioctl+0x23/0x30 [ 528.592340][T16297] ? security_file_ioctl+0xa1/0xd0 [ 528.597453][T16297] __x64_sys_ioctl+0xe3/0x120 [ 528.602135][T16297] do_syscall_64+0xf7/0x1c0 [ 528.603859][T16305] fuse: Unknown parameter '£O4|€zìd$H˜±J*áHãÀEˆzÑ…ñ2¢OL' 14:39:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c05) [ 528.606645][T16297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.606655][T16297] RIP: 0033:0x45a639 [ 528.606666][T16297] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 528.606672][T16297] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 528.606685][T16297] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 528.659595][T16297] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 528.667562][T16297] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 528.675523][T16297] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 528.675529][T16297] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:39:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:44 executing program 5 (fault-call:2 fault-nth:10): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) [ 528.777938][T16297] Bluetooth: Can't register HCI device [ 528.873687][T16322] FAULT_INJECTION: forcing a failure. [ 528.873687][T16322] name failslab, interval 1, probability 0, space 0, times 0 [ 528.887172][T16322] CPU: 1 PID: 16322 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 528.895001][T16322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.905112][T16322] Call Trace: [ 528.908407][T16322] dump_stack+0x1fb/0x318 [ 528.912770][T16322] should_fail+0x555/0x770 [ 528.917202][T16322] __should_failslab+0x11a/0x160 14:39:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c06) [ 528.922144][T16322] should_failslab+0x9/0x20 [ 528.926762][T16322] kmem_cache_alloc_trace+0x5d/0x2f0 [ 528.932050][T16322] ? apply_wqattrs_prepare+0x199/0xab0 [ 528.937513][T16322] apply_wqattrs_prepare+0x199/0xab0 [ 528.942802][T16322] ? alloc_workqueue+0xdd8/0x13e0 [ 528.947840][T16322] ? trace_lock_acquire+0x159/0x1d0 [ 528.953055][T16322] apply_workqueue_attrs_locked+0xc5/0x650 [ 528.958917][T16322] alloc_workqueue+0xde5/0x13e0 [ 528.963798][T16322] ? vsnprintf+0x1b64/0x1c00 [ 528.968389][T16322] ? vsnprintf+0x139/0x1c00 [ 528.972902][T16322] hci_register_dev+0x1a6/0x720 [ 528.977783][T16322] hci_uart_tty_ioctl+0x8ad/0xa20 [ 528.982828][T16322] ? hci_uart_tty_write+0x10/0x10 [ 528.987853][T16322] tty_ioctl+0xf83/0x15c0 [ 528.987872][T16322] ? tty_do_resize+0x180/0x180 [ 528.987885][T16322] do_vfs_ioctl+0x744/0x1730 [ 528.987893][T16322] ? __fget+0x431/0x510 [ 528.987913][T16322] ? tomoyo_file_ioctl+0x23/0x30 [ 528.996996][T16322] ? security_file_ioctl+0xa1/0xd0 [ 528.997010][T16322] __x64_sys_ioctl+0xe3/0x120 [ 528.997026][T16322] do_syscall_64+0xf7/0x1c0 [ 528.997041][T16322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.997050][T16322] RIP: 0033:0x45a639 [ 528.997061][T16322] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 529.054297][T16322] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 529.062706][T16322] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 529.070697][T16322] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 529.078662][T16322] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 529.086642][T16322] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 529.094611][T16322] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:39:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x100011, &(0x7f00000002c0)=ANY=[@ANYBLOB="66643dca553cee7f579f0319f23d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 529.125026][T16305] fuse: Unknown parameter '£O4|€zìd$H˜±J*áHãÀEˆzÑ…ñ2¢OL' [ 529.159819][T16322] Bluetooth: Can't register HCI device 14:39:45 executing program 5 (fault-call:2 fault-nth:11): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:39:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c07) 14:39:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='f\xe3\x0f\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r0}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:45 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643db0ddd136e92c1b83e8dcce02425abb0000000000ffff00000000000000df2e439acbb2f2d4847812550792e36ff38c60fb895d9a75f4fd38fb49d0ae8868445f657744cc67eb4a258ce3b303f7ff45b5a1b008b37765ee4b7fa424e7336e9c52777d67b9070b884e02b396e0a1d2fa122cf6092763d6c07bc582f0998645153d5ea5f50689ce4362f2c7b4a5edf263eaf8d8c9b61ee58270bd3cef4586473daec81f8d2b60e57b6beca688446e26c177704fa9b82a2b22936076367211b9a0417c8807e385602356776a5194f6d4c3752be781453ed1d43d3339fbd4", @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x2) 14:39:45 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="391700000100cd00"/17]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0x6, &(0x7f0000005580)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, &(0x7f0000005640)=0xb0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000000)={r7, 0x20}, 0x8) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 529.774766][T16358] fuse: Bad value for 'group_id' [ 529.802628][T16361] FAULT_INJECTION: forcing a failure. [ 529.802628][T16361] name failslab, interval 1, probability 0, space 0, times 0 [ 529.825728][T16368] fuse: Bad value for 'group_id' [ 529.834207][T16361] CPU: 0 PID: 16361 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 529.842057][T16361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.852110][T16361] Call Trace: [ 529.855404][T16361] dump_stack+0x1fb/0x318 [ 529.859739][T16361] should_fail+0x555/0x770 [ 529.864160][T16361] __should_failslab+0x11a/0x160 [ 529.869093][T16361] ? kzalloc+0x1f/0x40 [ 529.873157][T16361] should_failslab+0x9/0x20 [ 529.877655][T16361] __kmalloc+0x7a/0x340 [ 529.881895][T16361] kzalloc+0x1f/0x40 [ 529.885785][T16361] alloc_workqueue+0x116/0x13e0 [ 529.890656][T16361] hci_register_dev+0x1fc/0x720 [ 529.895510][T16361] hci_uart_tty_ioctl+0x8ad/0xa20 [ 529.900530][T16361] ? hci_uart_tty_write+0x10/0x10 [ 529.905546][T16361] tty_ioctl+0xf83/0x15c0 [ 529.909880][T16361] ? tty_do_resize+0x180/0x180 [ 529.914642][T16361] do_vfs_ioctl+0x744/0x1730 [ 529.919323][T16361] ? __fget+0x431/0x510 [ 529.923663][T16361] ? tomoyo_file_ioctl+0x23/0x30 [ 529.928783][T16361] ? security_file_ioctl+0xa1/0xd0 [ 529.933884][T16361] __x64_sys_ioctl+0xe3/0x120 [ 529.938546][T16361] do_syscall_64+0xf7/0x1c0 [ 529.943035][T16361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.948941][T16361] RIP: 0033:0x45a639 [ 529.952815][T16361] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 529.972523][T16361] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 529.980934][T16361] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 529.988974][T16361] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 14:39:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c08) [ 529.996937][T16361] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 530.004886][T16361] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 530.012835][T16361] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 [ 530.028920][T16361] Bluetooth: Can't register HCI device 14:39:46 executing program 5 (fault-call:2 fault-nth:12): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:39:46 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$USBDEVFS_CONNECTINFO(r2, 0x40085511, &(0x7f00000001c0)) 14:39:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 530.231670][T16389] FAULT_INJECTION: forcing a failure. [ 530.231670][T16389] name failslab, interval 1, probability 0, space 0, times 0 [ 530.257813][T16389] CPU: 1 PID: 16389 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 530.265670][T16389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.275729][T16389] Call Trace: [ 530.279041][T16389] dump_stack+0x1fb/0x318 [ 530.283386][T16389] should_fail+0x555/0x770 [ 530.287822][T16389] __should_failslab+0x11a/0x160 [ 530.292777][T16389] should_failslab+0x9/0x20 [ 530.297396][T16389] kmem_cache_alloc_node+0x65/0x280 [ 530.302593][T16389] ? alloc_unbound_pwq+0x7ac/0xe90 [ 530.307831][T16389] alloc_unbound_pwq+0x7ac/0xe90 [ 530.312855][T16389] apply_wqattrs_prepare+0x3b8/0xab0 [ 530.318150][T16389] apply_workqueue_attrs_locked+0xc5/0x650 [ 530.324043][T16389] alloc_workqueue+0xde5/0x13e0 [ 530.328924][T16389] ? vsnprintf+0x1b64/0x1c00 [ 530.333575][T16389] ? vsnprintf+0x139/0x1c00 [ 530.338118][T16389] hci_register_dev+0x1a6/0x720 [ 530.342988][T16389] hci_uart_tty_ioctl+0x8ad/0xa20 [ 530.348118][T16389] ? hci_uart_tty_write+0x10/0x10 [ 530.353146][T16389] tty_ioctl+0xf83/0x15c0 [ 530.357477][T16389] ? tty_do_resize+0x180/0x180 [ 530.362240][T16389] do_vfs_ioctl+0x744/0x1730 [ 530.366831][T16389] ? __fget+0x431/0x510 [ 530.370993][T16389] ? tomoyo_file_ioctl+0x23/0x30 [ 530.375934][T16389] ? security_file_ioctl+0xa1/0xd0 [ 530.381044][T16389] __x64_sys_ioctl+0xe3/0x120 [ 530.385721][T16389] do_syscall_64+0xf7/0x1c0 [ 530.390228][T16389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 530.396291][T16389] RIP: 0033:0x45a639 [ 530.400178][T16389] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 530.419786][T16389] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:39:46 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000400)='./file0/../file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="660300", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$USBDEVFS_RELEASE_PORT(r3, 0x80045519, &(0x7f00000001c0)=0x401) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) fspick(r3, &(0x7f00000003c0)='./file0/../file0\x00', 0xf14bb014b9711950) ioctl$VIDIOC_DBG_G_CHIP_INFO(0xffffffffffffffff, 0xc0c85666, &(0x7f00000002c0)={{0x4, @addr=0x9}, "e514cd4c280e6dfecb5445dddfe45129e0eb132cb63653149a777b84913aa154"}) [ 530.428205][T16389] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 530.436180][T16389] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 530.444188][T16389] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 530.452160][T16389] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 530.460135][T16389] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:39:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c09) [ 530.517898][T16389] Bluetooth: Can't register HCI device [ 530.526432][T16399] fuse: Unknown parameter 'f' 14:39:46 executing program 5 (fault-call:2 fault-nth:13): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:39:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000007400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:46 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r3, 0xc0485661, &(0x7f0000000240)={0x2, 0x1, @raw_data=[0x0, 0x100, 0x4, 0x0, 0x400, 0x0, 0x7fff800, 0xfffff75b, 0x3, 0x3, 0x3ff, 0xb5c, 0x2, 0xfffffffc, 0x4436, 0xa59]}) [ 530.702373][T16414] FAULT_INJECTION: forcing a failure. [ 530.702373][T16414] name failslab, interval 1, probability 0, space 0, times 0 [ 530.741328][T16414] CPU: 0 PID: 16414 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 530.749190][T16414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.759252][T16414] Call Trace: [ 530.762646][T16414] dump_stack+0x1fb/0x318 [ 530.766988][T16414] should_fail+0x555/0x770 [ 530.771444][T16414] __should_failslab+0x11a/0x160 [ 530.776389][T16414] should_failslab+0x9/0x20 [ 530.780899][T16414] kmem_cache_alloc_trace+0x5d/0x2f0 [ 530.786211][T16414] ? alloc_workqueue+0x16a/0x13e0 [ 530.791255][T16414] alloc_workqueue+0x16a/0x13e0 [ 530.796141][T16414] hci_register_dev+0x1fc/0x720 [ 530.801031][T16414] hci_uart_tty_ioctl+0x8ad/0xa20 [ 530.806057][T16414] ? hci_uart_tty_write+0x10/0x10 [ 530.811084][T16414] tty_ioctl+0xf83/0x15c0 [ 530.815444][T16414] ? tty_do_resize+0x180/0x180 [ 530.820210][T16414] do_vfs_ioctl+0x744/0x1730 [ 530.824823][T16414] ? __fget+0x431/0x510 [ 530.828984][T16414] ? tomoyo_file_ioctl+0x23/0x30 [ 530.833921][T16414] ? security_file_ioctl+0xa1/0xd0 [ 530.839029][T16414] __x64_sys_ioctl+0xe3/0x120 [ 530.843705][T16414] do_syscall_64+0xf7/0x1c0 [ 530.848213][T16414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 530.854095][T16414] RIP: 0033:0x45a639 [ 530.857983][T16414] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 530.877585][T16414] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 530.885994][T16414] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 530.893959][T16414] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 14:39:46 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) lstat(&(0x7f0000000100)='\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 530.901919][T16414] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 530.909880][T16414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 530.917858][T16414] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:39:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c0a) [ 531.006006][T16414] Bluetooth: Can't register HCI device 14:39:47 executing program 5 (fault-call:2 fault-nth:14): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) [ 531.067208][T16425] fuse: Bad value for 'fd' [ 531.074914][T16406] fuse: Unknown parameter 'f' [ 531.087485][T16425] fuse: Bad value for 'fd' 14:39:47 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000300)={0x64, 0x4}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r3, 0x3b72, &(0x7f0000000280)={0x20, 0x2, 0x8, 0x0, 0x7f}) r4 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_netdev_private(r4, 0x89f1, &(0x7f0000000340)="a0404083297fee3b46ace4018a5c5a1eca452f") lstat(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f00000002c0)={'z\x00', 0x2}, &(0x7f0000000380)="cd9b2493be7045fdd9b50e3d4b162fa212b2611a4802b19195f5f1b45997689d1d3642d8f5c18a35660fb7d06f3fe4b480aac697d526165c74075198fa2940ca34a235b332a2e7d3fcdb64d42497232f4ce2b5236924ad84f1f9c43c2686689b93be9bdb08b88f420ac24aeb338eaec2e0ec12d16f272af505f0cb72784c34037480df202e10e444b0d5575dfbefd31205b99f26be4c526d6b055d1d0c31514b7c28149a954ff5f68f74530baf49cf3716218b7ffb995b055e2196c2337c3ec3899b32ca0bb99b46204e8253429a00005e4726a996517b86f5c584194d8aade97622c27dd6ec6ad39635342268047e1d87a5c0afa7ddb8386970a7c627abdd", 0x1c5, r6) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030343030c3ee055e5613cddb725f69643d84b4bed47f2d8f944395bd55fe0f3ff2f4422e81e09bbc8bdc6f73e5fac4c240773b77be4a1b9d1362f8e7e9836fbc86a837f61e0a762a5a96b967c9efdf3269a3bef886526fb8e3", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:47 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="6600b1d3994c8b216e841388de3d2ad4da04720fcb08ba07d98498812b0ad293ecafc8dd67a17f832b43869f9d991205ff202d7bc8b007a9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grouo%\n>1', @ANYRESDEC=r1, @ANYBLOB="2c008c646c4459c2f066dd1c2d334b3453f6968aaa0f22c8b2e7618fccd2514eab83ea45c3911e236e"]) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0, 0x0], 0x2, 0xfd1}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r5, r6) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000580)={0x0, 0x3}, &(0x7f00000005c0)=0x8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, 0x0) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0/file0\x00', 0x80000000, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000300)="1096b38018d8b4cbc0d53da3a1f4f8275d00d6e2210470e2599cdd7b39687e37dc45ade40aea43336d8d710fcb44ca695b0fa36de986426b0b4f48cbfcdb99dd37688260db7771f1abeba6ecc55d1d3193cbb6e8b76487d8ca445312595d8c8efb480206e8feb9d1bc8fc215dacb227c2291cbc37894588c47f8a7695d", 0x7d, 0x4}, {&(0x7f0000000380)="26580fda0543b26d9f33ff9671145e0430b43605ce060d316f090f1903e4", 0x1e, 0x7f}], 0x888c40, &(0x7f0000000500)={[{@jdev={'jdev', 0x3d, './file0/file0'}}, {@nolargeio='nolargeio'}, {@usrquota='usrquota'}, {@commit={'commit', 0x3d, 0x5}}, {@data_ordered='data=ordered'}], [{@seclabel='seclabel'}, {@uid_gt={'uid>', r7}}]}) [ 531.187676][T16439] FAULT_INJECTION: forcing a failure. [ 531.187676][T16439] name failslab, interval 1, probability 0, space 0, times 0 [ 531.222119][T16439] CPU: 0 PID: 16439 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 531.230025][T16439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.240176][T16439] Call Trace: [ 531.243476][T16439] dump_stack+0x1fb/0x318 [ 531.243497][T16439] should_fail+0x555/0x770 [ 531.243516][T16439] __should_failslab+0x11a/0x160 [ 531.243528][T16439] ? kasprintf+0x6a/0x90 [ 531.243542][T16439] should_failslab+0x9/0x20 [ 531.266057][T16439] __kmalloc_track_caller+0x79/0x340 [ 531.271349][T16439] kvasprintf+0x70/0xf0 [ 531.271367][T16439] kasprintf+0x6a/0x90 [ 531.271387][T16439] alloc_workqueue+0x52d/0x13e0 [ 531.271419][T16439] hci_register_dev+0x1fc/0x720 [ 531.271439][T16439] hci_uart_tty_ioctl+0x8ad/0xa20 [ 531.271452][T16439] ? hci_uart_tty_write+0x10/0x10 [ 531.271465][T16439] tty_ioctl+0xf83/0x15c0 [ 531.271483][T16439] ? tty_do_resize+0x180/0x180 [ 531.279328][T16443] fuse: Unknown parameter 'f' [ 531.279705][T16439] do_vfs_ioctl+0x744/0x1730 [ 531.279718][T16439] ? __fget+0x431/0x510 [ 531.279737][T16439] ? tomoyo_file_ioctl+0x23/0x30 [ 531.279752][T16439] ? security_file_ioctl+0xa1/0xd0 [ 531.294699][T16439] __x64_sys_ioctl+0xe3/0x120 [ 531.294718][T16439] do_syscall_64+0xf7/0x1c0 [ 531.294734][T16439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.294744][T16439] RIP: 0033:0x45a639 [ 531.294758][T16439] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 531.371168][T16439] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 531.379627][T16439] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 531.387619][T16439] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 531.395862][T16439] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 531.403851][T16439] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 531.411927][T16439] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:39:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 531.529587][T16457] fuse: Bad value for 'rootmode' 14:39:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c0b) 14:39:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 531.852949][T16443] fuse: Unknown parameter 'f' [ 531.946707][T16457] fuse: Bad value for 'rootmode' 14:39:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b70200000e400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:47 executing program 2: r0 = socket$inet6(0xa, 0x200000000003, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0xff, 0x8001}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@rand_addr="c84b735dfd6a7e36451bd2500d523c7d", 0x800, 0x0, 0xfe, 0x0, 0x4fe, 0x500}, 0x20) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030dba32a705475224a22294a773030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c677276bc705f93a73d", @ANYRESDEC=r3, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c0c) [ 532.164174][T16479] fuse: Bad value for 'rootmode' [ 532.212983][T16479] fuse: Bad value for 'rootmode' 14:39:48 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x934, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000002c0)={0xdc, 0x5, 0x2, 0xffff, 0x9, [{0x6, 0x3, 0x1, 0x0, 0x0, 0x200}, {0xb13, 0x8, 0x8, 0x0, 0x0, 0x8}, {0x3, 0x8, 0x1, 0x0, 0x0, 0x2886}, {0x8, 0xfff, 0x10001, 0x0, 0x0, 0x400}, {0x200000000, 0xfff, 0x6, 0x0, 0x0, 0x105}, {0x8, 0x3, 0x0, 0x0, 0x0, 0x1}, {0xfffffffffffffffe, 0x9, 0xe4, 0x0, 0x0, 0x200}, {0x400, 0x4, 0x9, 0x0, 0x0, 0x100}, {0xfc, 0x5, 0x7, 0x0, 0x0, 0x104}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x84, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x6}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@appraise_type='appraise_type=imasig'}, {@dont_measure='dont_measure'}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@fowner_eq={'fowner', 0x3d, r6}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@appraise_type='appraise_type=imasig'}]}}) 14:39:48 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmyde=00000000000000000040000,user_i8\r', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b70200000f400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 532.366937][T16495] fuse: Unknown parameter 'rootmyde' [ 532.419332][T16495] fuse: Unknown parameter 'rootmyde' [ 533.487960][ T8067] Bluetooth: hci0: command 0x1003 tx timeout [ 533.495379][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 535.567979][ T8067] Bluetooth: hci0: command 0x1001 tx timeout [ 535.574522][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 537.647892][ T2878] Bluetooth: hci0: command 0x1009 tx timeout 14:39:57 executing program 5 (fault-call:2 fault-nth:15): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:39:57 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x2, 0x44903) ioctl$VIDIOC_S_TUNER(r2, 0x4054561e, &(0x7f00000002c0)={0x81, "5231ba37f8455fa18a707c71ae3f98ae013dfd6c88b4218318788f7a67fb7cf3", 0x0, 0x1000, 0x7, 0x8001, 0x8, 0x1, 0x400, 0x283af3ec}) 14:39:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000014400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c0d) 14:39:57 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x934, 0x0) r1 = dup(r0) r2 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x240000, 0x0) ioctl$BLKPG(r2, 0x934, 0x0) r3 = dup2(r2, 0xffffffffffffffff) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f00000001c0)='group_id', &(0x7f00000002c0)='./file0\x00', r3) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x4}}, 0xfffffffffffffe57) dup2(r4, r5) connect$pptp(r4, &(0x7f0000000480)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x10, 0x0}}}, 0x382) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000100)) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r6, 0x934, 0x0) r7 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r7, 0x934, 0x0) r8 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r8, 0x934, 0x0) r9 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r9, 0x934, 0x0) r10 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r10, 0x934, 0x0) r11 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r11, 0x934, 0x0) r12 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r12, 0x934, 0x0) r13 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r13, 0x934, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYPTR, @ANYRES16=r6, @ANYBLOB="9a42e92b83e06d1d8e79d833b84c89995e547a9849bfecd791845b31cd3ed46e0ccf040c2e824e0a18bdac4ff711414aa39f577e1cfdfde77d6b631b0aeca093b4a8cc17", @ANYRESOCT=r7, @ANYBLOB="25e5b35c010560e9c5c4a416d4e678c74ca983403b06cdcff7ea2fe92392cea60c087067863e22db73d0edce1fd22f887e9c2a81556c1ed2ee87a74180a2ea34ee6ff2baa957e16d17b3a6d8d9b57a1366e97379d7f5496234538f823e2ff4a2fba9da2543631caee8d0b49bc1a907ef94c50120a4dd54b998b095c293c49d290d5a7119d462a928723aaeb920e1c714383429d7f7c4a3c4432d76cb622174556da2855462488be0875626f99da7c819681007cb693bcea02427bb", @ANYRESHEX=0x0, @ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=r9, @ANYRESDEC=r13, @ANYRESOCT=r10, @ANYRES32=r11, @ANYRES64=0x0, @ANYRES16=r12, @ANYRES32=r2]]) r14 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2100400}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r14, @ANYBLOB="000827bd7000ffdbdf2501002b6083c97ee0bf00000000000008410000004c001800000005756470000000000000000000000000000000000000000000000000000000000000000000000000000000001a470000000000000000000000000000000000000000000000b73cd04e574be0e9442243c11b12cd39cdae77741f0aa36e0337f5bdb62747d8017835327774bb021052d2972092d166b7d73d296bb9b91063bcd97805b2b55bb19999fd096614f68ba1b2bf"], 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:57 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x80, 0x81, 0xff, 0xf7, 0xeecb, 0x0, 0x3, 0x3ff, 0x1c7, 0x38, 0x1f3, 0x8, 0x54, 0x20, 0x1, 0x7, 0x2, 0x599}, [{0x0, 0x81, 0x2, 0x3f, 0xfffffffc, 0x3, 0xffff, 0xd2}, {0x7, 0x81, 0x0, 0x2, 0x1, 0xfffffffc, 0x1ff, 0x8001}], "761cd8894db665d59b3faabd75402805bc3ead7e6c9289910c8d0de918baa07a9bca3bbfc067d150b4f3eef5267c1e01300aa11adda691e4cdd8", [[], [], []]}, 0x3b2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 541.855799][T16520] FAULT_INJECTION: forcing a failure. [ 541.855799][T16520] name failslab, interval 1, probability 0, space 0, times 0 [ 541.894289][T16520] CPU: 0 PID: 16520 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 541.902241][T16520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.912292][T16520] Call Trace: [ 541.915574][T16520] dump_stack+0x1fb/0x318 [ 541.919898][T16520] should_fail+0x555/0x770 [ 541.924299][T16520] __should_failslab+0x11a/0x160 [ 541.929221][T16520] ? kasprintf+0x6a/0x90 [ 541.933460][T16520] should_failslab+0x9/0x20 [ 541.937953][T16520] __kmalloc_track_caller+0x79/0x340 [ 541.943220][T16520] kvasprintf+0x70/0xf0 [ 541.947359][T16520] kasprintf+0x6a/0x90 [ 541.951419][T16520] alloc_workqueue+0x52d/0x13e0 [ 541.956284][T16520] hci_register_dev+0x1fc/0x720 [ 541.961123][T16520] hci_uart_tty_ioctl+0x8ad/0xa20 [ 541.966127][T16520] ? hci_uart_tty_write+0x10/0x10 [ 541.971135][T16520] tty_ioctl+0xf83/0x15c0 [ 541.975450][T16520] ? tty_do_resize+0x180/0x180 [ 541.980216][T16520] do_vfs_ioctl+0x744/0x1730 [ 541.984885][T16520] ? __fget+0x431/0x510 [ 541.989039][T16520] ? tomoyo_file_ioctl+0x23/0x30 [ 541.993968][T16520] ? security_file_ioctl+0xa1/0xd0 [ 541.999071][T16520] __x64_sys_ioctl+0xe3/0x120 [ 542.003730][T16520] do_syscall_64+0xf7/0x1c0 [ 542.008220][T16520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 542.014102][T16520] RIP: 0033:0x45a639 [ 542.017978][T16520] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 542.037562][T16520] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 542.045957][T16520] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 14:39:58 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0), &(0x7f00000002c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:58 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000200)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000001000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 542.053912][T16520] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 542.061862][T16520] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 542.069924][T16520] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 542.077873][T16520] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:39:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c0e) 14:39:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:39:58 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="3900001a060000000001001700000100cdd5d3baec1ddfc197513308663e9b7ca0e94613980d34ee924b6a53bb5637babdcabce81f09ea78fe1f4c43363a97c2891e9f3347dd96825a0d9ffa5f82209adfd28ea911f50360d9"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0x1, 0x28, &(0x7f0000000200)}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x2710, 0x4, 0x6000, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$usbfs(&(0x7f0000000340)='/d\xf5\x82\xdc$LF\xce_sb/00#/0Q#\x00', 0x7928, 0x7b9f58442337f60c) ioctl$USBDEVFS_CLAIM_PORT(r3, 0x80045518, &(0x7f0000000180)=0x20) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x8000, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x3f, 0xff], 0x0, 0x204000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 544.127928][ T8067] Bluetooth: hci0: command 0x1003 tx timeout [ 544.134181][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 546.207965][ T2878] Bluetooth: hci0: command 0x1001 tx timeout [ 546.214948][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 548.287941][ T8067] Bluetooth: hci0: command 0x1009 tx timeout 14:40:08 executing program 5 (fault-call:2 fault-nth:16): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:40:08 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0/../file0\x00'}, 0x10) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) setxattr$system_posix_acl(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{}], {}, [{0x8, 0x0, r2}], {0x10, 0x2}, {0x20, 0xc}}, 0x34, 0x3) lsetxattr$trusted_overlay_redirect(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x3) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:08 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="3900001af11bf9ffd43df79d00100100cd61276f268ec744a15b2dbdb19220b71e46b702b0ac801f2733da21548a29d2c2debf53f2e224bc14db8a3e66be02000000ffd0ee9181a172a62390508f570f38fc796cc8a2d0bca3404c74944628afac77c399"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:40:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:40:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c10) 14:40:08 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:08 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f00000003c0)) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:08 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) creat(&(0x7f0000000180)='.\x00', 0x230) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') dup2(r3, r4) ioctl$IMCLEAR_L2(r4, 0x80044946, &(0x7f0000000000)=0x1f) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 552.807898][T16596] FAULT_INJECTION: forcing a failure. [ 552.807898][T16596] name failslab, interval 1, probability 0, space 0, times 0 [ 552.826984][T16596] CPU: 0 PID: 16596 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 552.835271][T16596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.845652][T16596] Call Trace: [ 552.849108][T16596] dump_stack+0x1fb/0x318 [ 552.853461][T16596] should_fail+0x555/0x770 [ 552.857909][T16596] __should_failslab+0x11a/0x160 [ 552.862902][T16596] should_failslab+0x9/0x20 [ 552.867773][T16596] kmem_cache_alloc_trace+0x5d/0x2f0 [ 552.873357][T16596] ? apply_wqattrs_prepare+0xe9/0xab0 [ 552.878847][T16596] apply_wqattrs_prepare+0xe9/0xab0 [ 552.884067][T16596] ? alloc_workqueue+0xdd8/0x13e0 [ 552.889117][T16596] ? trace_lock_acquire+0x159/0x1d0 [ 552.894618][T16596] apply_workqueue_attrs_locked+0xc5/0x650 [ 552.900448][T16596] alloc_workqueue+0xde5/0x13e0 14:40:08 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300)='9p\x00', 0x84000, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e733d756e69782c6163636573733d757365722c7665727388886e3d3970323030302e752c667363616368612c6e6f6465766d6157c361756469742c736d61636b6673726f6f743d66757365002c00"]) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000400)='./file0/../file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 552.905337][T16596] hci_register_dev+0x1fc/0x720 [ 552.910346][T16596] hci_uart_tty_ioctl+0x8ad/0xa20 [ 552.915400][T16596] ? hci_uart_tty_write+0x10/0x10 [ 552.920449][T16596] tty_ioctl+0xf83/0x15c0 [ 552.924891][T16596] ? tty_do_resize+0x180/0x180 [ 552.929744][T16596] do_vfs_ioctl+0x744/0x1730 [ 552.934340][T16596] ? __fget+0x431/0x510 [ 552.938638][T16596] ? tomoyo_file_ioctl+0x23/0x30 [ 552.943596][T16596] ? security_file_ioctl+0xa1/0xd0 [ 552.948719][T16596] __x64_sys_ioctl+0xe3/0x120 [ 552.953419][T16596] do_syscall_64+0xf7/0x1c0 [ 552.957941][T16596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.964058][T16596] RIP: 0033:0x45a639 [ 552.968023][T16596] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 552.987626][T16596] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 552.996667][T16596] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 553.004630][T16596] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 553.012590][T16596] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 553.020548][T16596] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 553.028541][T16596] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:40:09 executing program 5 (fault-call:2 fault-nth:17): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) [ 553.089162][T16596] Bluetooth: Can't register HCI device 14:40:09 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000001c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, r1}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303a6937a2d780fe2f757365725f69643d6ca560823608664e12510fcf61b8cc0474fb9e2881757e4e8a1990", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0), 0x4) 14:40:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c11) 14:40:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 553.262601][T16628] fuse: Bad value for 'rootmode' [ 553.265060][T16626] FAULT_INJECTION: forcing a failure. [ 553.265060][T16626] name failslab, interval 1, probability 0, space 0, times 0 [ 553.288782][T16626] CPU: 0 PID: 16626 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 553.296807][T16626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.306871][T16626] Call Trace: [ 553.310173][T16626] dump_stack+0x1fb/0x318 [ 553.314509][T16626] should_fail+0x555/0x770 [ 553.318926][T16626] __should_failslab+0x11a/0x160 [ 553.323861][T16626] should_failslab+0x9/0x20 [ 553.328370][T16626] kmem_cache_alloc_trace+0x5d/0x2f0 [ 553.333648][T16626] ? apply_wqattrs_prepare+0x199/0xab0 [ 553.339102][T16626] apply_wqattrs_prepare+0x199/0xab0 [ 553.344411][T16626] ? alloc_workqueue+0xdd8/0x13e0 [ 553.349535][T16626] ? trace_lock_acquire+0x159/0x1d0 [ 553.354753][T16626] apply_workqueue_attrs_locked+0xc5/0x650 [ 553.360574][T16626] alloc_workqueue+0xde5/0x13e0 [ 553.365440][T16626] hci_register_dev+0x1fc/0x720 [ 553.370288][T16626] hci_uart_tty_ioctl+0x8ad/0xa20 [ 553.375304][T16626] ? hci_uart_tty_write+0x10/0x10 [ 553.380323][T16626] tty_ioctl+0xf83/0x15c0 [ 553.384652][T16626] ? tty_do_resize+0x180/0x180 [ 553.389410][T16626] do_vfs_ioctl+0x744/0x1730 [ 553.393990][T16626] ? __fget+0x431/0x510 [ 553.398151][T16626] ? tomoyo_file_ioctl+0x23/0x30 [ 553.403096][T16626] ? security_file_ioctl+0xa1/0xd0 [ 553.408217][T16626] __x64_sys_ioctl+0xe3/0x120 [ 553.412901][T16626] do_syscall_64+0xf7/0x1c0 [ 553.417492][T16626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.423384][T16626] RIP: 0033:0x45a639 [ 553.427269][T16626] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 553.446866][T16626] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 553.455272][T16626] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 553.463240][T16626] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 553.471208][T16626] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 553.479172][T16626] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 553.487399][T16626] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 [ 553.507605][T16632] fuse: Bad value for 'rootmode' [ 553.592120][T16626] Bluetooth: Can't register HCI device 14:40:09 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) open(&(0x7f00000001c0)='./file0/file0\x00', 0xa40900, 0x180) 14:40:09 executing program 5 (fault-call:2 fault-nth:18): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:40:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:40:09 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000004c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1c00}}]}}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000300)={0x0, 0x0, 0x2}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x100000, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000440), &(0x7f0000000480)=0x4) setxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x3) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) symlinkat(&(0x7f00000001c0)='./file0/../file0\x00', r2, &(0x7f00000002c0)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r7, 0x400454ce, r8) fchownat(0xffffffffffffff9c, &(0x7f0000000280)='./file0/../file0\x00', r6, r8, 0x5cab81c21fed813a) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:09 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.memory_pressure\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=r2, @ANYBLOB="d0b480c90440962f5def3968aaed6dbe25cadd95d6502fcd9219148ee5cbd77b78646fd8b2417e4ea37ca3884a69de12e98463f5175589d60f"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000280)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000680)=[{&(0x7f00000002c0)="e2d2243dcf211b962138dbc325509cad7e1e64eb7e3f453d10b0e391ac8fad8f5ce0ab43093a855279a296a0b7dc7db8d76ec7155b6c69fd", 0x38, 0x8}, {&(0x7f0000000300)="2ae560723a2d18bc7e64cd7bba180dbc37308b39f2232533ed2a7728f8c046a7e3fd00d5b7e2d70b9194d035b52a5eee87954243ce3a2277539508c65584b4f17d15be552ee5b6d3c3495a84cb13b1ab7c207485e50cf8375865efcbadb6b57e1512621e45db73c841f3f4274a394ad31b8495e3c57f86b050b8d559db4d40c629b0256b57415cd7de534e1ab831d6c9a5b7cd1aa8e45000058287a3fdebf92fe6a202f5a048d2eecae876ff7e", 0xad, 0x7bd5db89}, {&(0x7f00000003c0)="df96b696cbd426c08b1f89b9835eff3c5362e76da3bce8284cee46fbbe64e7f7e497445cfa609e8dc34b2f37cd809fa95ae65331d8fc4c2f0db25ee6fc015816630f8603e0b8b5d6739d9c7144c7fe6a76ee8eb6dde7ca299eb6fd32c09bc7ff8ee84fc41fafcd2accb56d6f5e0cfe7e4dbcb9dfd56f1fd33cb90ed2f4b092bda6afe4785e236d7c827782a1ee1c9b48479ae185df9c5f01ece08089b61f5fa6a6a0dcf11c0afc571c266c3f2086d7c18073a771", 0xb4, 0x7}], 0x1080002, &(0x7f0000000480)='GPLGPL\x00') [ 553.748605][T16645] FAULT_INJECTION: forcing a failure. [ 553.748605][T16645] name failslab, interval 1, probability 0, space 0, times 0 [ 553.828004][T16645] CPU: 1 PID: 16645 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 553.835891][T16645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.845970][T16645] Call Trace: [ 553.849268][T16645] dump_stack+0x1fb/0x318 [ 553.853582][T16645] should_fail+0x555/0x770 [ 553.857982][T16645] __should_failslab+0x11a/0x160 [ 553.862918][T16645] should_failslab+0x9/0x20 [ 553.867398][T16645] kmem_cache_alloc_node+0x65/0x280 [ 553.872593][T16645] ? alloc_unbound_pwq+0x7ac/0xe90 [ 553.877697][T16645] alloc_unbound_pwq+0x7ac/0xe90 [ 553.882638][T16645] apply_wqattrs_prepare+0x3b8/0xab0 [ 553.887923][T16645] apply_workqueue_attrs_locked+0xc5/0x650 [ 553.893719][T16645] alloc_workqueue+0xde5/0x13e0 [ 553.898563][T16645] hci_register_dev+0x1fc/0x720 [ 553.903405][T16645] hci_uart_tty_ioctl+0x8ad/0xa20 [ 553.908408][T16645] ? hci_uart_tty_write+0x10/0x10 [ 553.913421][T16645] tty_ioctl+0xf83/0x15c0 [ 553.917734][T16645] ? tty_do_resize+0x180/0x180 [ 553.922477][T16645] do_vfs_ioctl+0x744/0x1730 [ 553.927055][T16645] ? __fget+0x431/0x510 [ 553.931192][T16645] ? tomoyo_file_ioctl+0x23/0x30 [ 553.936108][T16645] ? security_file_ioctl+0xa1/0xd0 [ 553.941200][T16645] __x64_sys_ioctl+0xe3/0x120 [ 553.945858][T16645] do_syscall_64+0xf7/0x1c0 [ 553.950343][T16645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.956213][T16645] RIP: 0033:0x45a639 [ 553.960097][T16645] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 553.979685][T16645] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 553.988075][T16645] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 553.996050][T16645] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 554.004006][T16645] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 554.011959][T16645] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 554.019931][T16645] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:40:10 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'batadv0\x00', &(0x7f0000000000)=ANY=[]}) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x934, 0x0) fcntl$setlease(r2, 0x400, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x400, 0x0, 0x0, 0x0, 0x4, 0x6, 0xfb, 0x0, 0x0, 0x80000000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 554.084205][T16655] fuse: Unknown parameter 'grou_id' [ 554.098298][T16645] Bluetooth: Can't register HCI device [ 554.195257][T16655] fuse: Unknown parameter 'grou_id' 14:40:10 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x80, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000240)={0x8000, 0x9}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0xe8e6797b8266fbe2, &(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000>000000000000400p0,user_id<', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000000340)=[{&(0x7f0000000280)=""/97, 0x61}, {&(0x7f0000000300)=""/55, 0x37}], 0x2, &(0x7f0000000380)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1, 0x0) 14:40:10 executing program 2: mkdir(&(0x7f00000002c0)='./file0/../file0\x00', 0x140) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f836d6f64653d30303030302030303030303030303030303034303030302c756fb27365725f69", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r6 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='c', 0x300, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r6, 0xfffffffffffffffc, r5, 0x0) r7 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="471d8b7e7e2159a213f3ca8517c97ab0d9fc97a9a6c13644a7e7aa62bfdda2cf1831161bec4ea3e8858830f90dbed9ad9624e35f78b0993d143b21572d00378d5d4b01652c1c5b8a877363a241ba756c2fd400fcddbb2b5840cbd7e40a802deeb8bcc9953f0458047e86", 0x6a, r5) keyctl$describe(0x6, r7, &(0x7f00000003c0)=""/175, 0xaf) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r4, 0x400454ce, r8) chown(&(0x7f0000000180)='./file0/../file0\x00', r3, r8) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:10 executing program 5 (fault-call:2 fault-nth:19): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:40:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000002400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 554.373483][T16681] FAULT_INJECTION: forcing a failure. [ 554.373483][T16681] name failslab, interval 1, probability 0, space 0, times 0 [ 554.430442][T16681] CPU: 0 PID: 16681 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 554.438315][T16681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.448381][T16681] Call Trace: [ 554.451681][T16681] dump_stack+0x1fb/0x318 [ 554.456023][T16681] should_fail+0x555/0x770 [ 554.460456][T16681] __should_failslab+0x11a/0x160 [ 554.465403][T16681] ? new_inode_pseudo+0x135/0x240 [ 554.470443][T16681] should_failslab+0x9/0x20 [ 554.474961][T16681] kmem_cache_alloc+0x56/0x2e0 [ 554.479739][T16681] new_inode_pseudo+0x135/0x240 [ 554.484598][T16681] new_inode+0x28/0x1c0 [ 554.488774][T16681] ? start_creating+0x17b/0x270 [ 554.493633][T16681] debugfs_create_dir+0x6f/0x440 [ 554.498591][T16681] hci_register_dev+0x2a1/0x720 [ 554.498643][T16681] hci_uart_tty_ioctl+0x8ad/0xa20 [ 554.498655][T16681] ? hci_uart_tty_write+0x10/0x10 [ 554.498666][T16681] tty_ioctl+0xf83/0x15c0 [ 554.498685][T16681] ? tty_do_resize+0x180/0x180 [ 554.498699][T16681] do_vfs_ioctl+0x744/0x1730 [ 554.498708][T16681] ? __fget+0x431/0x510 [ 554.498726][T16681] ? tomoyo_file_ioctl+0x23/0x30 [ 554.527316][T16681] ? security_file_ioctl+0xa1/0xd0 [ 554.541489][T16681] __x64_sys_ioctl+0xe3/0x120 [ 554.546161][T16681] do_syscall_64+0xf7/0x1c0 [ 554.550671][T16681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.556561][T16681] RIP: 0033:0x45a639 [ 554.560458][T16681] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:40:10 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x40040, 0x0) ioctl$PPPIOCATTACH(r2, 0x4004743d, &(0x7f00000002c0)=0x3) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c12) 14:40:10 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x40602, 0x0) dup2(r0, r1) recvfrom$llc(r1, &(0x7f00000001c0)=""/12, 0xc, 0x0, &(0x7f00000002c0)={0x1a, 0x14, 0x1, 0xb2, 0x4, 0xc0, @link_local}, 0x10) sync() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) inotify_init1(0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x103) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000080040000,user_id=', @ANYRESDEC=0x0, @ANYRES32=r2, @ANYRESDEC=r3, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:10 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r6, 0x934, 0x0) r7 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r7, 0x934, 0x0) r8 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r8, 0x934, 0x0) r9 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r9, 0x934, 0x0) r10 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r10, 0x934, 0x0) r11 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r11, 0x934, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000001c0)={'batad\x00\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe0', &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRESOCT=r6, @ANYRES16=0x0, @ANYRESHEX=r7, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYRES16=r8, @ANYRESHEX=r9, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRESHEX=r9, @ANYRESDEC=0x0], @ANYRESHEX, @ANYRESHEX=0x0, @ANYRESOCT=r10, @ANYBLOB="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"], @ANYRESHEX=0x0, @ANYRESDEC=r11]]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r12 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r12, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r12, 0xae80, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r13 = getpid() sched_setattr(r13, &(0x7f0000000040)={0x30}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = fcntl$dupfd(r15, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r18, 0x407, 0x0) write(r18, &(0x7f0000000340), 0x41395527) vmsplice(r17, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_RUN(r12, 0xae80, 0x0) [ 554.580068][T16681] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 554.588502][T16681] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 554.596478][T16681] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 554.604450][T16681] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 554.612424][T16681] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 554.620412][T16681] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:40:10 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket(0x9, 0x1, 0x7f) setsockopt$inet_dccp_int(r1, 0x21, 0x10, &(0x7f0000000240)=0x6, 0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f0000000480)='./file0/../file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r2) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x200000, &(0x7f0000000380)=ANY=[@ANYBLOB='\b\x00=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303030303030302c000000000000003d569a4d29357ed3f965cee4b17782ceb2103e872a20e237529f32791e959b70ce1a98296f4b6fb9200311fbeee211180a1010033cd834252739a1213490177f6f6f89", @ANYRESDEC=0x0, @ANYBLOB="2c67726f758b5f69643d", @ANYRESDEC=r2, @ANYBLOB=',allow_other,blksize=0x0000000000000800,default_permissions,\x00']) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x82, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) openat$cgroup(r4, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r6, 0x934, 0x0) ioctl$BLKTRACESTOP(r6, 0x1275, 0x0) [ 554.737976][T16681] debugfs: out of free dentries, can not create directory 'hci0' [ 554.762630][T16698] fuse: Bad value for 'fd' 14:40:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 554.850175][T16706] fuse: Unknown parameter '' 14:40:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c25) 14:40:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:40:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c48) 14:40:11 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0/../file0\x00', &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300)='ramfs\x00', 0x14, &(0x7f0000000340)='rootmode') [ 555.251360][T16695] fuse: Bad value for 'fd' [ 555.579561][T16743] fuse: Unknown parameter '' [ 556.767935][ T22] Bluetooth: hci0: command 0x1003 tx timeout [ 556.774065][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 558.848234][ T12] Bluetooth: hci0: command 0x1001 tx timeout [ 558.854595][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 560.927903][ T22] Bluetooth: hci0: command 0x1009 tx timeout 14:40:20 executing program 5 (fault-call:2 fault-nth:20): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:40:20 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="374c1a72cf53fc4d9585e1410de65b2c00"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x40) setresuid(0x0, r5, 0x0) lstat(&(0x7f0000000280)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000001c0)='./file0/../file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x440, &(0x7f0000000600)=ANY=[@ANYBLOB="7c6529af4227951eba857aa739a3cad1c929d48331c7adc2e143fa1e445374bd1f10c1f750a9c49c0114a21c86464e639416e79fe209c878d266fff79a69a828da9f9e62ae7cb68cf04f55c47e5501e144d562d26929d4c536963671ea8fe0f1f6d238dbcde1382a671ddcf000d207ab6862455d0504a23a672083857aed2603af1b989a58be79c9b5fa985456df25367da76736df67bf58c0519e9ef2b72f4bd4ee1900b152c5912c9367cf09145d546c92b40fe5da3d", @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d303030303030303030ffff3030303030303032303030302c757365725f69643d", @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000000003ff,measure,euid=', @ANYRESDEC=r6, @ANYBLOB=',dont_appraise,\x00']) 14:40:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:40:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c4c) 14:40:20 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x81080) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:40:20 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone3(&(0x7f00000004c0)={0x88000, &(0x7f00000001c0), &(0x7f00000002c0)=0x0, &(0x7f0000000300), 0x22, 0x0, &(0x7f0000000380)=""/74, 0x4a, &(0x7f0000000400)=""/148}, 0x40) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0x6, &(0x7f0000005580)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, &(0x7f0000005640)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={r5, 0x1}, 0x8) syz_open_procfs$namespace(r0, &(0x7f0000000500)='ns/uts\x00') r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000600)='./file0/../file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r7}}) pivot_root(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='./file0\x00') open$dir(&(0x7f0000000340)='./file0/../file0\x00', 0x2b8c43, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 564.811999][T16753] fuse: Bad value for 'group_id' [ 564.848120][T16760] FAULT_INJECTION: forcing a failure. [ 564.848120][T16760] name failslab, interval 1, probability 0, space 0, times 0 [ 564.861105][T16760] CPU: 0 PID: 16760 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 564.868925][T16760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.878986][T16760] Call Trace: [ 564.882296][T16760] dump_stack+0x1fb/0x318 [ 564.886640][T16760] should_fail+0x555/0x770 [ 564.891047][T16760] __should_failslab+0x11a/0x160 [ 564.895965][T16760] ? new_inode_pseudo+0x135/0x240 [ 564.900970][T16760] should_failslab+0x9/0x20 [ 564.905453][T16760] kmem_cache_alloc+0x56/0x2e0 [ 564.910215][T16760] new_inode_pseudo+0x135/0x240 [ 564.915050][T16760] new_inode+0x28/0x1c0 [ 564.919189][T16760] ? start_creating+0x17b/0x270 [ 564.924034][T16760] debugfs_create_dir+0x6f/0x440 [ 564.928953][T16760] hci_register_dev+0x2a1/0x720 [ 564.933832][T16760] hci_uart_tty_ioctl+0x8ad/0xa20 [ 564.938837][T16760] ? hci_uart_tty_write+0x10/0x10 [ 564.943846][T16760] tty_ioctl+0xf83/0x15c0 [ 564.948162][T16760] ? tty_do_resize+0x180/0x180 [ 564.952908][T16760] do_vfs_ioctl+0x744/0x1730 [ 564.957478][T16760] ? __fget+0x431/0x510 [ 564.961615][T16760] ? tomoyo_file_ioctl+0x23/0x30 [ 564.966548][T16760] ? security_file_ioctl+0xa1/0xd0 [ 564.971642][T16760] __x64_sys_ioctl+0xe3/0x120 [ 564.976302][T16760] do_syscall_64+0xf7/0x1c0 [ 564.980789][T16760] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 564.986767][T16760] RIP: 0033:0x45a639 [ 564.990642][T16760] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 565.010350][T16760] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 565.018751][T16760] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 565.026710][T16760] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 565.034664][T16760] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 565.042620][T16760] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 565.050579][T16760] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 [ 565.068604][T16764] fuse: Invalid rootmode [ 565.131959][T16760] debugfs: out of free dentries, can not create directory 'hci0' 14:40:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c5c) 14:40:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000300)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0xc, @local, 0x7}, {0xa, 0x4e23, 0x7f, @rand_addr="4ec640600f9fc49ff3771ab4dea866af", 0x7fff}, r6, 0x7f}}, 0x48) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000000)=0x80, 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r7, r8) write$RDMA_USER_CM_CMD_BIND(r8, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r6, 0x10, 0x0, @in6={0xa, 0x4e24, 0xdbc, @local, 0xfffffffe}}}, 0x90) 14:40:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 565.394074][T16782] fuse: Invalid rootmode 14:40:21 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6609da", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:21 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x3a0000, &(0x7f00000002c0)={{'\x00', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x101}}]}}) umount2(&(0x7f00000001c0)='./file0/../file0\x00', 0x0) 14:40:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c68) [ 565.532617][T16793] fuse: Unknown parameter 'f Ú0x0000000000000003' [ 565.541951][T16793] fuse: Unknown parameter 'f Ú0x0000000000000003' [ 567.167952][ T12] Bluetooth: hci0: command 0x1003 tx timeout [ 567.174347][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 569.257934][ T22] Bluetooth: hci0: command 0x1001 tx timeout [ 569.264064][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 571.328037][ T12] Bluetooth: hci0: command 0x1009 tx timeout 14:40:31 executing program 5 (fault-call:2 fault-nth:21): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:40:31 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x700, 0x0) mkdirat(r2, &(0x7f00000002c0)='./file0\x00', 0x4) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:40:31 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030fd0e30303030303034303030302c75ffff000069643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:31 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c6c) 14:40:31 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0xbf11, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 575.691703][T16815] fuse: Bad value for 'rootmode' [ 575.733814][T16826] FAULT_INJECTION: forcing a failure. [ 575.733814][T16826] name failslab, interval 1, probability 0, space 0, times 0 [ 575.751826][T16826] CPU: 0 PID: 16826 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 575.759678][T16826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.769748][T16826] Call Trace: [ 575.773047][T16826] dump_stack+0x1fb/0x318 [ 575.777388][T16826] should_fail+0x555/0x770 [ 575.781842][T16826] __should_failslab+0x11a/0x160 [ 575.786782][T16826] ? security_inode_alloc+0x36/0x1e0 [ 575.792091][T16826] should_failslab+0x9/0x20 [ 575.796597][T16826] kmem_cache_alloc+0x56/0x2e0 [ 575.801360][T16826] security_inode_alloc+0x36/0x1e0 [ 575.806478][T16826] inode_init_always+0x3b5/0x920 [ 575.811434][T16826] new_inode_pseudo+0x7f/0x240 [ 575.816199][T16826] new_inode+0x28/0x1c0 [ 575.820355][T16826] ? start_creating+0x17b/0x270 [ 575.825206][T16826] debugfs_create_dir+0x6f/0x440 [ 575.830143][T16826] hci_register_dev+0x2a1/0x720 [ 575.835015][T16826] hci_uart_tty_ioctl+0x8ad/0xa20 [ 575.840043][T16826] ? hci_uart_tty_write+0x10/0x10 [ 575.845082][T16826] tty_ioctl+0xf83/0x15c0 [ 575.849430][T16826] ? tty_do_resize+0x180/0x180 [ 575.854194][T16826] do_vfs_ioctl+0x744/0x1730 [ 575.858783][T16826] ? __fget+0x431/0x510 [ 575.866670][T16826] ? tomoyo_file_ioctl+0x23/0x30 [ 575.871599][T16826] ? security_file_ioctl+0xa1/0xd0 [ 575.876728][T16826] __x64_sys_ioctl+0xe3/0x120 [ 575.881403][T16826] do_syscall_64+0xf7/0x1c0 [ 575.885898][T16826] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 575.891787][T16826] RIP: 0033:0x45a639 [ 575.895675][T16826] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 575.915287][T16826] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 575.923695][T16826] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 575.931660][T16826] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 575.939622][T16826] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 575.947761][T16826] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 575.955729][T16826] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:40:31 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="391700100100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) ioctl$KVM_ASSIGN_DEV_IRQ(r5, 0x4040ae70, &(0x7f0000000180)={0x7, 0x0, 0x100, 0x800}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000240)="331f03b066e1f7e99a377dd380f2d50b0ea0c01300dca178317a4f327cc7b2a7a08723ff0b26f063d304abb01b80a5650d90c89ac7cd9cf16ff91bddac3808f9976bf8771fdaff67767900be5a2af8e44bbf86fb8306a484e144a337138fe07463775b8bf862da1d76726ab0d8ffb217b480", 0x72, 0x80000000}, {&(0x7f00000002c0)="cc94338e36961baa0c6db36bd066896d588a59010df1bd39f44ff8676291f76da8238ce3910f84f158b26fd08e245f85cde4a1813978acd84f9d4b09bc4dfe76906013331dea2a2bf42264f4d6608995f6c287200e87bf331f3dbecb52c5768d1bd6f266820c2e83d1c872c6921c72c6788fcd4275347ea96ffa13c4661e275ef15c01c733b5553ecfd2c898a0d45339210ead1af6bc428d96cb3c264b7878344d0dd6e42de0e40c352b0bb04ffaccf181a9009dde6ee8b9806e69ab654044ffc45d5b42ae46d625deb922940c59787f1eec045f4a8b6c2ba50252cdf1a86f18896a740d4807b57428b043bb25bfe3f6", 0xf0, 0x8}, {&(0x7f0000000000)="637a05ab4c1412a41e5987d565abef6216b5892fb335722b60c894e8879cb730a3d1cdfb", 0x24}]) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r6, r7) ioctl$UI_SET_ABSBIT(r7, 0x40045567, 0x4) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 576.049125][T16826] debugfs: out of free dentries, can not create directory 'hci0' 14:40:32 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x200800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0xa) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x20, r4, 0x701, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x6}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x50, r4, 0x739b5bc08ac4c2f6, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x28a}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff0001}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4008000}, 0x20000014) write$UHID_GET_REPORT_REPLY(r0, &(0x7f00000001c0)={0xa, 0x5, 0xff, 0x1}, 0xa) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000380)={0x5, &(0x7f0000000300)=[{}, {}, {}, {}, {}]}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r5, @ANYBLOB=',rootmode=900000000000000000=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 576.184701][T16850] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 14:40:32 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) lstat(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r6, 0x400454ce, r7) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r8, 0x400454ce, r9) setxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x4}, [{0x2, 0x6, r1}, {0x2, 0x6f8ea612a4cfd6d6, r1}, {0x2, 0x4, r4}, {0x2, 0x57461278db120da2, r1}, {0x2, 0x2, r1}, {0x2, 0x4, r5}], {}, [{0x8, 0x4, r7}, {0x8, 0x2, r9}], {0x10, 0x1}, {0x20, 0x2}}, 0x64, 0x4) 14:40:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c74) [ 578.207842][ T22] Bluetooth: hci0: command 0x1003 tx timeout [ 578.213986][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 580.287926][ T12] Bluetooth: hci0: command 0x1001 tx timeout [ 580.294088][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 582.367828][ T22] Bluetooth: hci0: command 0x1009 tx timeout 14:40:42 executing program 5 (fault-call:2 fault-nth:22): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:40:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="66643db307068b3966b1f464a3f93ae3b791790f65f303018ead64af99e5b4bf3bef12e066b11dea80ae506e9b0b4818", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:40:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c7a) 14:40:42 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x110) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:42 executing program 3: write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00']}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x4, 0x1, 0x8}}, 0x30) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r5, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000005c0)={'team0\x00', r7}) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$devlink(&(0x7f00000003c0)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x34, r9, 0x49becf029131c5d7, 0x0, 0x0, {}, [@nsim={{0x4, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) sendmsg$DEVLINK_CMD_GET(r4, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, &(0x7f0000000440)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1bb81f042df7a9b0a97ff6159febf6cb021f618451bef9", @ANYRES16=r9, @ANYBLOB="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"], 0x114}, 0x1, 0x0, 0x0, 0x4}, 0x50) dup2(r3, r4) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x1, &(0x7f0000000180)={0xa, &(0x7f0000000240)=[{0x8000, 0x9, 0x1, 0x40}, {0x2, 0xe5, 0x8, 0x3}, {0x80, 0x3, 0x46, 0x10001}, {0x5, 0x2, 0xff, 0x6}, {0x100, 0x7f, 0x6, 0x9}, {0x7, 0x8a, 0x80, 0x1}, {0x9, 0xfa, 0x8, 0xfffffe01}, {0x100, 0x4, 0x2, 0x7}, {0x4, 0x1, 0x81, 0x20}, {0x2, 0x95, 0x81, 0x7}]}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0xe5) [ 586.574023][T16892] fuse: Bad value for 'fd' [ 586.629412][T16892] fuse: Bad value for 'fd' [ 586.661273][T16901] FAULT_INJECTION: forcing a failure. [ 586.661273][T16901] name failslab, interval 1, probability 0, space 0, times 0 [ 586.701348][T16901] CPU: 1 PID: 16901 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 586.709220][T16901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.719290][T16901] Call Trace: [ 586.722584][T16901] dump_stack+0x1fb/0x318 [ 586.726937][T16901] should_fail+0x555/0x770 [ 586.731357][T16901] __should_failslab+0x11a/0x160 [ 586.736299][T16901] ? kvasprintf_const+0x139/0x180 [ 586.741329][T16901] should_failslab+0x9/0x20 [ 586.745824][T16901] __kmalloc_track_caller+0x79/0x340 [ 586.751113][T16901] ? debugfs_create_dir+0x348/0x440 [ 586.756325][T16901] kstrdup_const+0x55/0x90 14:40:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000980)=0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r5, r6) ioctl$SIOCGSTAMPNS(r6, 0x8907, &(0x7f00000009c0)) r7 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r7, 0x934, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r9, 0x0) mount$9p_fd(0x0, &(0x7f0000000440)='./file0/../file0\x00', &(0x7f0000000480)='9p\x00', 0x2, &(0x7f00000008c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@privport='privport'}, {@access_client='access=client'}, {@mmap='mmap'}, {@access_uid={'access', 0x3d, r9}}, {@uname={'uname', 0x3d, 'eth'}}], [{@defcontext={'defcontext', 0x3d, 'root'}}]}}) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1408000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)={0x2a4, r2, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x69c}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bridge_slave_0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x60}]}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}]}, @TIPC_NLA_LINK={0x124, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x524}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x209}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}]}, @TIPC_NLA_BEARER={0xd0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @local}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x17fd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e23, @rand_addr=0x101}}}}]}]}, 0x2a4}}, 0xc00c440) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r11 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r11, 0x934, 0x0) ioctl$FS_IOC_FIEMAP(r11, 0xc020660b, &(0x7f0000000300)={0x5, 0x3, 0xb, 0x7ff, 0x5, [{0x80000001, 0x5, 0x73, 0x0, 0x0, 0x2980}, {0xffff, 0xfcd, 0x2, 0x0, 0x0, 0xc5f8f425d24752fe}, {0x1, 0xfffffffffffffffd, 0x1ff, 0x0, 0x0, 0xe80}, {0xd39, 0x5, 0x1, 0x0, 0x0, 0x800}, {0x0, 0x7f, 0xbde4, 0x0, 0x0, 0x1080}]}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="66643de8889dd8e9865879d72d026c498dd6b707c632e7e5c5061e8b07c93fb5bb9594bec66fc9d4c6795468324f9d69cd0f0fcfe3b29c8e91eeb9b6a41d7fd966330b2ec10423162a51ab09a1dbff0305d872f324e223a249ae5b2e5ea886bb0c343b9e1ddfaf74e0481393706c4751ce5bdeb803dd4e63f8b0da81749973764612cd94af678bcc640f428757442fdcc286bc3a", @ANYRESHEX=r10, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',g=', @ANYRESDEC=r12, @ANYBLOB="2cb19419002f55f92acd11149617a8ea3cae3e"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 586.760737][T16901] kvasprintf_const+0x139/0x180 [ 586.765706][T16901] kobject_set_name_vargs+0x63/0x120 [ 586.770995][T16901] dev_set_name+0x6c/0x90 [ 586.775329][T16901] ? up_write+0xf3/0x450 [ 586.779584][T16901] hci_register_dev+0x329/0x720 [ 586.784448][T16901] hci_uart_tty_ioctl+0x8ad/0xa20 [ 586.789479][T16901] ? hci_uart_tty_write+0x10/0x10 [ 586.794506][T16901] tty_ioctl+0xf83/0x15c0 [ 586.798848][T16901] ? tty_do_resize+0x180/0x180 [ 586.803620][T16901] do_vfs_ioctl+0x744/0x1730 14:40:42 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @mss={0x2, 0x7}, @timestamp, @mss={0x2, 0x6}, @mss={0x2, 0x7f}, @sack_perm, @mss={0x2, 0x62}], 0xf8f47) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_buf(r2, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self/net/pfkey\x00', 0xce119214e53c5637, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000780)=@assoc_value={0x0, 0x1}, 0x8) fcntl$setstatus(r2, 0x4, 0x80000000002c00) [ 586.808226][T16901] ? __fget+0x431/0x510 [ 586.812392][T16901] ? tomoyo_file_ioctl+0x23/0x30 [ 586.817337][T16901] ? security_file_ioctl+0xa1/0xd0 [ 586.822464][T16901] __x64_sys_ioctl+0xe3/0x120 [ 586.827160][T16901] do_syscall_64+0xf7/0x1c0 [ 586.831674][T16901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 586.837583][T16901] RIP: 0033:0x45a639 [ 586.841483][T16901] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:40:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303034303030302c75735f69a23d0000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="afff32360815d721a19e6251030e6cc76634ecac49da6400f4bb5e67d4d8e2cafa99fe5c9d9cf5e038020000002a29e63963f6c56eead3bbc215fe892c1fc01e91394e002482533fd8748e1d74282470d5fd23cba108f0dfa46333cadf6a6b0b"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1, 0x6, 0x7, 0xff, 0x0, 0x1ff, 0x108, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x90e7, 0x6}, 0x10000, 0x9, 0x4, 0x4, 0x8000000100000000, 0x5, 0x92}, r2, 0xd, r4, 0x18) [ 586.841488][T16901] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 586.841496][T16901] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 586.841501][T16901] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 586.841506][T16901] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 586.841512][T16901] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 586.841517][T16901] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 [ 586.862539][T16901] Bluetooth: Can't register HCI device [ 586.928090][T16910] fuse: Unknown parameter 'us_i¢' 14:40:42 executing program 5 (fault-call:2 fault-nth:23): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) [ 587.054707][T16924] debugfs: Directory 'hci0' with parent 'bluetooth' already present! [ 587.063428][T16924] FAULT_INJECTION: forcing a failure. [ 587.063428][T16924] name failslab, interval 1, probability 0, space 0, times 0 [ 587.076571][T16924] CPU: 0 PID: 16924 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 587.084390][T16924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.094479][T16924] Call Trace: [ 587.097780][T16924] dump_stack+0x1fb/0x318 [ 587.102141][T16924] should_fail+0x555/0x770 [ 587.106569][T16924] __should_failslab+0x11a/0x160 [ 587.111507][T16924] ? radix_tree_node_alloc+0x1a1/0x370 [ 587.116964][T16924] should_failslab+0x9/0x20 [ 587.121469][T16924] kmem_cache_alloc+0x56/0x2e0 [ 587.126226][T16924] ? __lock_acquire+0xc75/0x1be0 [ 587.131165][T16924] radix_tree_node_alloc+0x1a1/0x370 [ 587.136482][T16924] idr_get_free+0x2b8/0x8c0 [ 587.140999][T16924] idr_alloc_cyclic+0x18b/0x550 [ 587.145856][T16924] __kernfs_new_node+0x124/0x6b0 [ 587.150793][T16924] ? irq_work_queue+0xf8/0x110 [ 587.155612][T16924] ? vprintk_emit+0x2dd/0x3a0 [ 587.160298][T16924] kernfs_create_dir_ns+0x9b/0x230 [ 587.160317][T16924] sysfs_create_dir_ns+0x10a/0x290 [ 587.160335][T16924] kobject_add_internal+0x459/0xd50 [ 587.160352][T16924] kobject_add+0xef/0x190 [ 587.160360][T16924] ? trace_kmalloc+0xcd/0x130 [ 587.160374][T16924] ? kobject_init+0x86/0x1e0 [ 587.160390][T16924] get_device_parent+0x48b/0x4e0 [ 587.160401][T16924] device_add+0x360/0x14e0 [ 587.160413][T16924] ? kfree_const+0x39/0x40 [ 587.203296][T16924] ? dev_set_name+0x6c/0x90 [ 587.207835][T16924] hci_register_dev+0x331/0x720 [ 587.212679][T16924] hci_uart_tty_ioctl+0x8ad/0xa20 [ 587.217692][T16924] ? hci_uart_tty_write+0x10/0x10 [ 587.222705][T16924] tty_ioctl+0xf83/0x15c0 [ 587.227021][T16924] ? tty_do_resize+0x180/0x180 [ 587.231778][T16924] do_vfs_ioctl+0x744/0x1730 [ 587.236479][T16924] ? __fget+0x431/0x510 [ 587.240638][T16924] ? tomoyo_file_ioctl+0x23/0x30 [ 587.245572][T16924] ? security_file_ioctl+0xa1/0xd0 [ 587.250664][T16924] __x64_sys_ioctl+0xe3/0x120 [ 587.255325][T16924] do_syscall_64+0xf7/0x1c0 [ 587.259809][T16924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 587.265679][T16924] RIP: 0033:0x45a639 [ 587.269672][T16924] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 587.289276][T16924] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 587.297700][T16924] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 14:40:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000016400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 587.305651][T16924] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 587.313619][T16924] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 587.321573][T16924] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 587.329538][T16924] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 [ 587.451554][T16917] fuse: Unknown parameter 'us_i¢' 14:40:43 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x4, 0x2, &(0x7f0000000440)=[{&(0x7f0000000300)="427117f60325a7f5ef6022f86e7e1291b9d52df65c9bba4fd878dcc3c6583982aa946bb012a5", 0x26, 0xfffffffffffffffb}, {&(0x7f0000000340)="43e564a1d21665ad7081d3896037902100032a6f51a70f1417f45d943f257ff226a1fa20ec9f2546e2d0232e8596975c57fde7e1b28cb1c6539787ac3108d58be9a5df1cacfdca0f94aa822690c3dc90ce0a0cc95d0234ece474d0bb99f497413792651e89441017efce24fbaeea859b0ceaaee96cec54602a748b5522fafdcb20da8ab4632a7574f48f0bd2a9a0073fe48f57f258661e0d43fd5dd8aa18c6d6263a678910b94d9b44628f56035c79ad921ece74fd187e156b9e389a763872ec4a0b21d398ea7676c3d7bfa8fd53909d3881605f3d664f109e5671383a4f610229bc830b0fd8a494b3c9bb5565c50a953d95", 0xf2, 0x7}], 0x2020, &(0x7f00000005c0)={[{@cruft='cruft'}, {@check_relaxed='check=relaxed'}, {@gid={'gid', 0x3d, r4}}, {@map_normal='map=normal'}, {@session={'session', 0x3d, 0x3b}}, {@check_relaxed='check=relaxed'}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x800}}, {@uid={'uid', 0x3d, r5}}, {@overriderock='overriderockperm'}], [{@fsname={'fsname'}}, {@obj_role={'obj_role', 0x3d, 'group_id'}}, {@uid_lt={'uid<', r1}}, {@uid_eq={'uid', 0x3d, r7}}]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:43 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000000)={0x2e, 0x4, 0x0, {0x3, 0x6, 0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2e) 14:40:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="2c005a3ca1ff375f3b5a76e42ff8752b818d68332f2f39e54d3d240f09bf7c5fa7a46743735eada8b62c1f53801203520fd4094490f10c2287d43731a5cf6accf34a6b1cbfb41f4a937a9503f1be144771193c93010fe78f2606dbfb302ced9e6dfdf4c1c27a55e29854f02997613b1ed71184a5cb3e49f0a2cbf6bef4ec8f054351b8137ed34a45bf9d249f702f8baecdc8ec8cb3f6a79e4ed8ccdfd70d9e6133a4ef099210f3493a8f5bee66b51f1aac6a70e6f5fddca2c58e5e678911bdade547ed3dd8e832f2a8577618ce0f0b1f565a232cc2ea4e91ced1b5324d9ebc92785ac79e2eb03d1462d1f72540ba616860c4a1a981e3bcdd89d16fca672a18eab13435f63805cf3dd8dd5acd876daa41728f2f5582b9e0cd9578c81f8253c90ffd4e3343a81a76036900fea29b150498d0295fa9bf91e1d460beaca6b96deccfc02384b93cded37d1362a0e374a04570f55122"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 587.497268][T16933] 9pnet: Insufficient options for proto=fd [ 587.508282][T16913] fuse: Bad value for 'fd' 14:40:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:40:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x8}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1}}, {@default_permissions='default_permissions'}]}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="66643dc866ce42bdcbddda13f5a1c684a728cf4ea0587516dcd27719c1e79ee41a495f778426ea6164c500"/53, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, 0x0}}, 0x20) dup2(r2, r3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001380)={0xffffffffffffffff, 0x10, &(0x7f0000001340)={&(0x7f00000000c0)=""/189, 0xbd, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001400)={r2, 0x10, &(0x7f00000013c0)={&(0x7f0000000340)=""/4096, 0x1000, r4}}, 0x10) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 587.722805][T16950] fuse: blksize only supported for fuseblk [ 587.732614][T16950] fuse: blksize only supported for fuseblk 14:40:43 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 587.798755][T16955] fuse: Bad value for 'fd' [ 588.364729][T16963] fuse: Bad value for 'fd' [ 589.407785][ T7934] Bluetooth: hci0: command 0x1003 tx timeout [ 589.413996][ T1531] Bluetooth: hci0: sending frame failed (-49) 14:40:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:40:45 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x41, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000440)={0x6, [0xd9a1, 0xc4ed, 0x80, 0x3ff, 0x8000, 0x8]}, 0x10) dup2(r3, r4) ioctl$VIDIOC_DBG_G_CHIP_INFO(r4, 0xc0c85666, &(0x7f0000000480)={{0x1, @name="d6487a0b0265caef3199436362c0859b9a198d6f1ab876f5d3e953163313f835"}, "a9ef01fe9e7b9184cac3b7ce275cbd99c863a77ca2adb3210a3b5b83686edfe2", 0x2}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x2, r5, 0x1c, 0x0, @ib={0x1b, 0x8, 0x7fa, {"2106d292afe39aa9f57f057d8cf0f984"}, 0x0, 0x48, 0xfffffffffffffffb}}}, 0xa0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 591.487977][T16580] Bluetooth: hci0: command 0x1001 tx timeout [ 591.495177][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 593.567938][ T7934] Bluetooth: hci0: command 0x1009 tx timeout 14:40:53 executing program 5 (fault-call:2 fault-nth:24): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:40:53 executing program 3: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x10) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f00000002c0)={{0x6, 0x5, 0x5, 0x9, 'syz0\x00', 0x8}, 0x5, 0x200, 0x8, r1, 0x5, 0x6adf, 'syz1\x00', &(0x7f0000000280)=['wlan0+!md5sum\x00', '\x00', '\x00', '-}vboxnet0wlan0eth0\\bdeveth1\x00', 'batadv0\x00'], 0x35, [], [0x0, 0x7fff, 0x5, 0xf0]}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a0600000040fd000100cd000000"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) write$P9_RMKNOD(r2, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x4, 0x0, 0x6}}, 0x14) r6 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCOUTQNSD(r6, 0x894b, &(0x7f0000000180)) ioctl$KVM_RUN(r5, 0xae80, 0x0) 14:40:53 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f6448cf243030303030303030303030303030303034303030302c369dab690cc847fb27e98fb6233ed1d7a007c89de7e754878e534e34afc2f6260023e2561db8c80f45015e3426f8abaa43", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0x6, &(0x7f0000005580)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, &(0x7f0000005640)=0xb0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000040)={r7, 0x80, 0x1, [0xf800]}, &(0x7f00000000c0)=0xa) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000100)={r8, @in={{0x2, 0x4e24, @loopback}}, [0x5, 0x101, 0x115b80000000, 0x2, 0x1, 0x1, 0xd9, 0x1, 0x7fff, 0x101, 0x8, 0xa2f3, 0x4, 0x6, 0x1]}, &(0x7f0000000200)=0x100) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r9 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r9, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:40:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:40:53 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x2, 0x0, 0x10000, 0x9}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000380)={0x80000001, r1, 0x1, 0x101}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f00000002c0)) r3 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0xfffffffffffffbff, 0x40000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r3, 0x10, &(0x7f00000001c0)={&(0x7f0000000140)=""/18, 0x12, 0xffffffffffffffff}}, 0x10) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) ioctl$BLKPG(r4, 0x934, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYRES32=r4, @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d951157b500bb906c3030303030303030303034303030302c757365725f69643d4bd4d90efe8775b754581f39fffd02cc0ff5550a649b52c46ae396fca0621e33e3c895ac3daf299298f68765960188041ad75ce588a4fb40c77bed1c00d76141a8d04580bb6fd8de71d93c1843951623a464da6cae43e62f0c9cff9754a6f91fe0ad558300cc6875b8b8bef2371263c2253198a8924348b8a0678b7d767a9fd78e9e16f7070000001bfa87be3b1d5d319c8685c1145bd6f2a647423711d25ae1b2e65f00e947b52d3dfa776322432d9b5db92459d0441d05726c42f6bf9cb375", @ANYRESDEC, @ANYBLOB="2c6f75705f69643d36315937870ff10a0accebb9dec3f5ca2534d6bb1e28ffce53daac5d5172bde51f87b48c8f4bb3f96a01465838b70000", @ANYRESDEC=r2, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000440)) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 14:40:53 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) ioctl$VIDIOC_DBG_G_CHIP_INFO(r4, 0xc0c85666, &(0x7f0000000240)={{0x0, @name="afd157f78f7f82dc1c2f5bbdc01c51b84cd5a74ff9115fef9acf514bca16d313"}, "a829922b5a6f35db271da91a2eba64a90e2e7a7fcaeae96d686ef7edd5a386a3", 0x1}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 597.461609][T16988] fuse: Unknown parameter 'ÿÿÿÿ0x0000000000000004' [ 597.466100][T16989] fuse: Unknown parameter 'rootmodHÏ$000000000000000040000' [ 597.511117][T16988] fuse: Unknown parameter 'ÿÿÿÿ0x0000000000000004' [ 597.529676][T17000] fuse: Unknown parameter 'rootmodHÏ$000000000000000040000' [ 597.548389][T16995] debugfs: Directory 'hci0' with parent 'bluetooth' already present! [ 597.567217][T16995] FAULT_INJECTION: forcing a failure. [ 597.567217][T16995] name failslab, interval 1, probability 0, space 0, times 0 [ 597.595815][T16995] CPU: 0 PID: 16995 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 597.603681][T16995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 597.613740][T16995] Call Trace: 14:40:53 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) r2 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/\x00\x00sx#\x00', 0x1c, 0x800) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r7, r8) setsockopt$SO_TIMESTAMP(r8, 0x1, 0x23, &(0x7f0000000680)=0x9, 0x4) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r6, r9) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000440)=ANY=[@ANYBLOB="050200fd", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000480)=0x18) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0x6, &(0x7f00000004c0)={r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0xfe, 0x0}}}, 0x0, 0x0, 0x1}}, &(0x7f0000005640)=0x55) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f00000002c0)={r5, 0x3ff, 0x657}, 0x8) io_setup(0x5, &(0x7f0000000580)=0x0) io_getevents(r11, 0x0, 0x4, &(0x7f00000005c0)=[{}, {}, {}, {}], &(0x7f0000000640)={0x77359400}) r12 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x40000, 0x0) recvfrom(r12, &(0x7f0000000340)=""/70, 0x46, 0x60, &(0x7f00000003c0)=@x25={0x9, @null=' \x00'}, 0x80) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 597.613760][T16995] dump_stack+0x1fb/0x318 [ 597.613777][T16995] should_fail+0x555/0x770 [ 597.621375][T16995] __should_failslab+0x11a/0x160 [ 597.621390][T16995] ? __kernfs_new_node+0x4c/0x6b0 [ 597.621400][T16995] should_failslab+0x9/0x20 [ 597.621409][T16995] __kmalloc_track_caller+0x79/0x340 [ 597.621421][T16995] ? console_unlock+0xe41/0xef0 [ 597.621433][T16995] kstrdup_const+0x55/0x90 [ 597.654835][T16995] __kernfs_new_node+0x4c/0x6b0 [ 597.659811][T16995] ? irq_work_queue+0xf8/0x110 [ 597.664571][T16995] ? vprintk_emit+0x2dd/0x3a0 [ 597.669273][T16995] kernfs_create_dir_ns+0x9b/0x230 [ 597.674384][T16995] sysfs_create_dir_ns+0x10a/0x290 [ 597.679502][T16995] kobject_add_internal+0x459/0xd50 [ 597.684706][T16995] kobject_add+0xef/0x190 [ 597.689050][T16995] device_add+0x4a8/0x14e0 [ 597.693466][T16995] ? kfree_const+0x39/0x40 [ 597.697915][T16995] ? dev_set_name+0x6c/0x90 [ 597.702427][T16995] hci_register_dev+0x331/0x720 [ 597.707283][T16995] hci_uart_tty_ioctl+0x8ad/0xa20 [ 597.712305][T16995] ? hci_uart_tty_write+0x10/0x10 [ 597.717344][T16995] tty_ioctl+0xf83/0x15c0 [ 597.721682][T16995] ? tty_do_resize+0x180/0x180 [ 597.726437][T16995] do_vfs_ioctl+0x744/0x1730 [ 597.731192][T16995] ? __fget+0x431/0x510 [ 597.735337][T16995] ? tomoyo_file_ioctl+0x23/0x30 [ 597.740253][T16995] ? security_file_ioctl+0xa1/0xd0 [ 597.745347][T16995] __x64_sys_ioctl+0xe3/0x120 [ 597.750023][T16995] do_syscall_64+0xf7/0x1c0 [ 597.754580][T16995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 597.760477][T16995] RIP: 0033:0x45a639 [ 597.764357][T16995] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 597.783942][T16995] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 597.792334][T16995] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 597.800304][T16995] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 597.808260][T16995] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 14:40:53 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fTb', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030a0b73030300000000030303034303030302c757365725f69643d17e7b28c98cfbf9924659d875ccde5181ba6bd1ed07b01898e6e237122e93c38b8bde160363665b956e33a772053caa98bb2d7f5927e3776b61b1c0e99bd77e45d622ae42fb76669431f83043c83b19b72e69303bb26e55f93ce61b85f3a0707487c33cb13501779f5cd6fcff6fe9dce243b9d6e447ea9f1458e26473604c149f8a8185d40fa0137b7ce18e563e03b23b5b01d140f8f9375aa5077052ee99d1e8a7669ced75f4dcd", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 597.816216][T16995] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 597.824187][T16995] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 [ 597.841305][T16995] kobject_add_internal failed for hci0 (error: -12 parent: bluetooth) 14:40:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:40:53 executing program 5 (fault-call:2 fault-nth:25): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) [ 597.888105][T16995] Bluetooth: Can't register HCI device [ 597.913789][T17017] fuse: Unknown parameter 'fTb0x0000000000000003' [ 597.953435][T17017] fuse: Unknown parameter 'fTb0x0000000000000003' [ 598.010376][T17026] debugfs: Directory 'hci0' with parent 'bluetooth' already present! 14:40:54 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='overlay\x00', 0x10000, &(0x7f0000000300)={[{@index_off='index=off'}, {@workdir={'workdir', 0x3d, './file0/../file0'}}, {@xino_off='xino=off'}], [{@seclabel='seclabel'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'em1&ppp0^'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/fuse\x00'}}]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 598.054434][T17026] FAULT_INJECTION: forcing a failure. [ 598.054434][T17026] name failslab, interval 1, probability 0, space 0, times 0 [ 598.074248][T17026] CPU: 0 PID: 17026 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 598.082121][T17026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.092189][T17026] Call Trace: [ 598.095491][T17026] dump_stack+0x1fb/0x318 [ 598.099834][T17026] should_fail+0x555/0x770 [ 598.104269][T17026] __should_failslab+0x11a/0x160 [ 598.109218][T17026] ? __kernfs_new_node+0x97/0x6b0 [ 598.113011][T17032] overlayfs: unrecognized mount option "seclabel" or missing value [ 598.114246][T17026] should_failslab+0x9/0x20 [ 598.114259][T17026] kmem_cache_alloc+0x56/0x2e0 [ 598.114276][T17026] __kernfs_new_node+0x97/0x6b0 [ 598.114286][T17026] ? kernfs_add_one+0x515/0x670 [ 598.114305][T17026] ? sysfs_do_create_link_sd+0x7b/0x110 [ 598.146694][T17026] kernfs_new_node+0x97/0x170 [ 598.146711][T17026] kernfs_create_link+0xbb/0x210 [ 598.146726][T17026] sysfs_do_create_link_sd+0x89/0x110 [ 598.146737][T17026] sysfs_create_link+0x68/0x80 [ 598.146753][T17026] device_add+0x5d4/0x14e0 [ 598.166795][T17026] ? kfree_const+0x39/0x40 [ 598.166812][T17026] ? dev_set_name+0x6c/0x90 [ 598.166829][T17026] hci_register_dev+0x331/0x720 [ 598.166849][T17026] hci_uart_tty_ioctl+0x8ad/0xa20 [ 598.166862][T17026] ? hci_uart_tty_write+0x10/0x10 [ 598.166874][T17026] tty_ioctl+0xf83/0x15c0 [ 598.166896][T17026] ? tty_do_resize+0x180/0x180 [ 598.185182][T17026] do_vfs_ioctl+0x744/0x1730 [ 598.185193][T17026] ? __fget+0x431/0x510 [ 598.185212][T17026] ? tomoyo_file_ioctl+0x23/0x30 [ 598.185224][T17026] ? security_file_ioctl+0xa1/0xd0 [ 598.185238][T17026] __x64_sys_ioctl+0xe3/0x120 [ 598.185257][T17026] do_syscall_64+0xf7/0x1c0 [ 598.210463][T17033] overlayfs: unrecognized mount option "seclabel" or missing value [ 598.213137][T17026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 598.213149][T17026] RIP: 0033:0x45a639 [ 598.213160][T17026] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 598.213165][T17026] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 598.213175][T17026] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 598.213180][T17026] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 598.213190][T17026] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 14:40:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f0000000280)=0xffff, 0xfffffffffffffec5) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x549442, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x0, 0x2, 0x0, 0x3, {0xa, 0x4e20, 0x8, @ipv4={[], [], @broadcast}, 0x6}}}, 0x3a) [ 598.232380][T17026] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 598.232387][T17026] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:40:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000003070000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 598.393773][T17026] Bluetooth: Can't register HCI device 14:40:54 executing program 5 (fault-call:2 fault-nth:26): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:40:54 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x934, 0x0) write(r0, &(0x7f0000000040)="0f42", 0x3d5) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) 14:40:54 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x12a4c6e69ce32c55, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x84040000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r6, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040000}, 0x20000081) dup2(r4, r5) ioctl$TCGETX(r4, 0x5432, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @empty}}}, 0x90) r7 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x3, 0x2) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r3, r7}}, 0x18) gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x3c) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r8, 0x0, 0x0) ptrace$setopts(0x2105, r8, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 598.616202][T17059] debugfs: Directory 'hci0' with parent 'bluetooth' already present! [ 598.631510][T17059] FAULT_INJECTION: forcing a failure. [ 598.631510][T17059] name failslab, interval 1, probability 0, space 0, times 0 [ 598.678006][T17059] CPU: 1 PID: 17059 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 598.685872][T17059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.695934][T17059] Call Trace: [ 598.699241][T17059] dump_stack+0x1fb/0x318 [ 598.703589][T17059] should_fail+0x555/0x770 [ 598.708029][T17059] __should_failslab+0x11a/0x160 [ 598.712985][T17059] ? __kernfs_new_node+0x4c/0x6b0 [ 598.718032][T17059] should_failslab+0x9/0x20 [ 598.722555][T17059] __kmalloc_track_caller+0x79/0x340 14:40:54 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRES64, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',groTp_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./file0/../file0\x00') r2 = geteuid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r9, 0x0) lstat(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r11, 0x400454ce, r12) r13 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r13, 0x400454ce, r14) r15 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r15, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r15, 0x400454ce, r16) r17 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r17, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r17, 0x400454ce, r18) lsetxattr$system_posix_acl(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="02000000010001000000000002000400", @ANYRES32=r0, @ANYBLOB="02000100", @ANYRES32=r2, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r6, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000671", @ANYRES32=r7, @ANYBLOB="02000000", @ANYRES32=r9, @ANYBLOB="02000400", @ANYRES32=r10, @ANYBLOB="02000500", @ANYRES32=r0, @ANYBLOB="040000000000000008000000", @ANYRES32=r12, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="08000400", @ANYRES32=r16, @ANYBLOB="08000100", @ANYRES32=r18, @ANYBLOB="08000400", @ANYRES32=r1, @ANYBLOB="100001e5ffff1d002000070000000000"], 0x94, 0x1) [ 598.727856][T17059] kstrdup_const+0x55/0x90 [ 598.732277][T17059] __kernfs_new_node+0x4c/0x6b0 [ 598.737145][T17059] ? sysfs_do_create_link_sd+0x7b/0x110 [ 598.742698][T17059] kernfs_new_node+0x97/0x170 [ 598.742714][T17059] kernfs_create_link+0xbb/0x210 [ 598.742732][T17059] sysfs_do_create_link_sd+0x89/0x110 [ 598.757713][T17059] sysfs_create_link+0x68/0x80 [ 598.762477][T17059] device_add+0x9e3/0x14e0 [ 598.762490][T17059] ? kfree_const+0x39/0x40 [ 598.762504][T17059] ? dev_set_name+0x6c/0x90 [ 598.762522][T17059] hci_register_dev+0x331/0x720 [ 598.762542][T17059] hci_uart_tty_ioctl+0x8ad/0xa20 [ 598.762555][T17059] ? hci_uart_tty_write+0x10/0x10 [ 598.762569][T17059] tty_ioctl+0xf83/0x15c0 [ 598.796012][T17059] ? tty_do_resize+0x180/0x180 [ 598.796028][T17059] do_vfs_ioctl+0x744/0x1730 [ 598.796037][T17059] ? __fget+0x431/0x510 [ 598.796057][T17059] ? tomoyo_file_ioctl+0x23/0x30 [ 598.814468][T17059] ? security_file_ioctl+0xa1/0xd0 [ 598.819594][T17059] __x64_sys_ioctl+0xe3/0x120 [ 598.824292][T17059] do_syscall_64+0xf7/0x1c0 [ 598.828807][T17059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 598.834701][T17059] RIP: 0033:0x45a639 [ 598.838594][T17059] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 598.854833][T17075] fuse: Bad value for 'fd' [ 598.858237][T17059] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:40:54 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 598.858248][T17059] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 598.858254][T17059] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 598.858259][T17059] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 598.858263][T17059] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 598.858268][T17059] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:40:54 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000000)) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:40:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000003080000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 599.034711][T17059] Bluetooth: Can't register HCI device 14:40:55 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_buf(r2, 0x21, 0xf, &(0x7f00000002c0)="df928ae9f16cad10d78f6562f8889b86a504f368c20e46680a89d12bdf1390eb52c6a26871c6202d0fef7c2ed28c7f074afd64065f288b0b70858974b87bca85abb7618547911cfaa9", 0x49) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) flock(0xffffffffffffffff, 0x3) r5 = accept$inet(r3, 0x0, &(0x7f00000001c0)) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000340), 0x4) 14:40:55 executing program 5 (fault-call:2 fault-nth:27): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:40:55 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0x6, &(0x7f0000005580)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, &(0x7f0000005640)=0xb0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0x6, &(0x7f0000005580)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, &(0x7f0000005640)=0xb0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={r4, 0x9, 0xf7, 0x2, 0xc5d5, 0x1, 0xfff, 0xcdcc, {r7, @in={{0x2, 0x4e24, @broadcast}}, 0x800, 0x7, 0x4, 0xfffffffb, 0x3}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={r8, @in6={{0xa, 0x4e21, 0x7fffffff, @mcast1, 0x9}}, 0x8, 0x7, 0x9, 0x1ff, 0x20}, &(0x7f0000000240)=0x98) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r9 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r11 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r10, r11) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r10, 0x3) ptrace$setopts(0x4206, r9, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r12 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r12, 0x934, 0x0) ioctl$FITRIM(r12, 0xc0185879, &(0x7f0000000040)={0x3f, 0x7, 0x80000001}) [ 599.254550][T17102] debugfs: Directory 'hci0' with parent 'bluetooth' already present! [ 599.270256][T17102] FAULT_INJECTION: forcing a failure. [ 599.270256][T17102] name failslab, interval 1, probability 0, space 0, times 0 [ 599.289566][T17102] CPU: 0 PID: 17102 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 599.297427][T17102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 599.307499][T17102] Call Trace: [ 599.310854][T17102] dump_stack+0x1fb/0x318 [ 599.315198][T17102] should_fail+0x555/0x770 [ 599.319634][T17102] __should_failslab+0x11a/0x160 [ 599.324583][T17102] ? __kernfs_new_node+0x97/0x6b0 [ 599.329612][T17102] should_failslab+0x9/0x20 [ 599.334125][T17102] kmem_cache_alloc+0x56/0x2e0 [ 599.338892][T17102] __kernfs_new_node+0x97/0x6b0 [ 599.343777][T17102] ? kernfs_find_and_get_ns+0x9a/0xd0 [ 599.349167][T17102] kernfs_new_node+0x97/0x170 [ 599.353849][T17102] __kernfs_create_file+0x4a/0x2f0 [ 599.358962][T17102] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 599.364364][T17102] sysfs_merge_group+0x199/0x310 [ 599.369307][T17102] dpm_sysfs_add+0xcc/0x280 [ 599.373810][T17102] device_add+0xb56/0x14e0 [ 599.378230][T17102] ? device_add+0xae1/0x14e0 [ 599.382823][T17102] hci_register_dev+0x331/0x720 [ 599.387681][T17102] hci_uart_tty_ioctl+0x8ad/0xa20 [ 599.392699][T17102] ? hci_uart_tty_write+0x10/0x10 [ 599.397881][T17102] tty_ioctl+0xf83/0x15c0 14:40:55 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = dup2(r1, r2) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f00000000c0)={0x1, {{0xa, 0x4e22, 0x59e, @dev={0xfe, 0x80, [], 0x10}, 0x1cf0}}}, 0x88) lstat(&(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x8, 0x28e40) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r6, 0x934, 0x0) dup3(r5, r6, 0x80000) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, &(0x7f00000005c0)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r4}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 599.402248][T17102] ? tty_do_resize+0x180/0x180 [ 599.407014][T17102] do_vfs_ioctl+0x744/0x1730 [ 599.411600][T17102] ? __fget+0x431/0x510 [ 599.415767][T17102] ? tomoyo_file_ioctl+0x23/0x30 [ 599.420717][T17102] ? security_file_ioctl+0xa1/0xd0 [ 599.425963][T17102] __x64_sys_ioctl+0xe3/0x120 [ 599.430639][T17102] do_syscall_64+0xf7/0x1c0 [ 599.435192][T17102] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 599.441064][T17102] RIP: 0033:0x45a639 [ 599.444947][T17102] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 599.464612][T17102] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 599.473007][T17102] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 599.481012][T17102] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 599.489112][T17102] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 599.497064][T17102] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 14:40:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 599.505025][T17102] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 [ 599.534918][T17102] Bluetooth: Can't register HCI device 14:40:55 executing program 5 (fault-call:2 fault-nth:28): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) [ 599.702569][T17125] debugfs: Directory 'hci0' with parent 'bluetooth' already present! [ 599.711291][T17125] FAULT_INJECTION: forcing a failure. [ 599.711291][T17125] name failslab, interval 1, probability 0, space 0, times 0 [ 599.724314][T17125] CPU: 0 PID: 17125 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 599.732133][T17125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 599.742189][T17125] Call Trace: [ 599.745483][T17125] dump_stack+0x1fb/0x318 [ 599.749798][T17125] should_fail+0x555/0x770 [ 599.754202][T17125] __should_failslab+0x11a/0x160 [ 599.759139][T17125] ? __kernfs_new_node+0x97/0x6b0 [ 599.764150][T17125] should_failslab+0x9/0x20 [ 599.768721][T17125] kmem_cache_alloc+0x56/0x2e0 [ 599.773469][T17125] __kernfs_new_node+0x97/0x6b0 [ 599.778318][T17125] ? mutex_unlock+0xd/0x10 [ 599.782728][T17125] ? kernfs_activate+0x4c7/0x4e0 [ 599.787647][T17125] kernfs_new_node+0x97/0x170 [ 599.792324][T17125] __kernfs_create_file+0x4a/0x2f0 [ 599.797420][T17125] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 599.802780][T17125] sysfs_merge_group+0x199/0x310 [ 599.807717][T17125] dpm_sysfs_add+0xcc/0x280 [ 599.812215][T17125] device_add+0xb56/0x14e0 [ 599.816620][T17125] ? device_add+0xae1/0x14e0 [ 599.821207][T17125] hci_register_dev+0x331/0x720 [ 599.826059][T17125] hci_uart_tty_ioctl+0x8ad/0xa20 [ 599.831068][T17125] ? hci_uart_tty_write+0x10/0x10 [ 599.836092][T17125] tty_ioctl+0xf83/0x15c0 [ 599.840419][T17125] ? tty_do_resize+0x180/0x180 [ 599.845162][T17125] do_vfs_ioctl+0x744/0x1730 [ 599.849730][T17125] ? __fget+0x431/0x510 [ 599.853868][T17125] ? tomoyo_file_ioctl+0x23/0x30 [ 599.858782][T17125] ? security_file_ioctl+0xa1/0xd0 [ 599.863890][T17125] __x64_sys_ioctl+0xe3/0x120 [ 599.868547][T17125] do_syscall_64+0xf7/0x1c0 [ 599.873205][T17125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 599.879098][T17125] RIP: 0033:0x45a639 [ 599.882986][T17125] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 599.902653][T17125] RSP: 002b:00007fc82ec8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 599.911410][T17125] RAX: ffffffffffffffda RBX: 00007fc82ec8ac90 RCX: 000000000045a639 [ 599.919362][T17125] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 599.927322][T17125] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 599.935282][T17125] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc82ec8b6d4 [ 599.943243][T17125] R13: 00000000004c3634 R14: 00000000004d77e8 R15: 0000000000000004 14:40:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 599.954552][T17125] Bluetooth: Can't register HCI device 14:40:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f00000001c0)={'nat\x00', 0x0, 0x4, 0x8, [], 0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000180)=""/8}, &(0x7f0000000240)=0x78) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:40:55 executing program 5 (fault-call:2 fault-nth:29): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:40:56 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r5, r6) accept$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) sendmsg$xdp(r4, &(0x7f0000000640)={&(0x7f0000000240)={0x2c, 0x3, r7, 0x1f}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000280)="3cc236a0e5fc2f61d92fca21aa4b00fc92399fba5b8d5ab760eaa264d3168c0908760fa1c25ff8cd7fc4d18f5f", 0x2d}, {&(0x7f00000002c0)="c697fa8310bb2330d60ec461a3ede2a2d8e14e9469da9768abaf45c23c6d69f6cfbd090f58e56ad49291f93a22461a6e99552c2b7786c0a4b51e5fe58a48ccd741daee56bd4b3f2061d4faa12f3de83548c2a9d8757dfd93f1e75c8b643329ad20b3df99641d9ae934509900e6aa4619756c21863a3a2656f988d551a0efe3afcd77bfd020f23c4881aade6eb7ffa26a98e72cf82dbfc022f9782d8b758c41fe1950fac6082200733de5903909a58fe4db2c27f6559551c08cf1e65767e84181b07eb90126fbd8d041439d358b0b85f163a310e016f0e6ef370b26438ed03193609b5b54ea3adaa61a2c1ae9cdccffcdf473008922", 0xf5}, {&(0x7f00000003c0)="91892d6b5d5978c68a748438d381ac5680334a58cf47e4b80a7490d5d9cea8df7d76f2a77b0820c18c422657f8749d0600f51524290528f377d1ea88ae51d09623515c4e1d1e192a01c76a3901c1229f4cfd939991c086e8e8a45f078ac1c597562bde7115f2ed708fc83bae0d6fd724abd6097d24c53581a62475a3f12c5e2ac10a21835750e6bce6fa59a17b88e3d981eaf092c2894fb0b3cce178", 0x9c}, {&(0x7f0000000480)="09d937836d7b498669e8be6ed6980c46fb3e730206ff51bec66917e652aca4c27e289276", 0x24}, {&(0x7f00000004c0)="cb96733d42e8bc4ff6548a36b0ce57e8f77efbbbb38846e799912d145cb1ad5f3c9f5fb9ff812c865a16ccaa", 0x2c}], 0x5, 0x0, 0x0, 0xae3360796617e455}, 0x20000000) 14:40:56 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="02003d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c3d00000000000000de0000000000efc1beefcf803bd647270b8b6ab000cbabb7de7f9bee8ef2dd1eae54fb78945e35a4c4913259dcaa9a762fc8f77273a07444063d926290101e8afe6abbca7b4ae9974f93f0dc80b2f13ca1387d1c0bedff6db8139c60ff5dedc0d90f6dae3163de23df66c1435a26cea42fbe7d1032548c524a5aff55b68332c0223c0a79028d9ffcaee72b3c50cd21106cf2a7f15f1c0953a003b2f9327a75da1050fa49360944bb0d8be0385c30ad53048a8365546959dd26724ff2a62b16f7d85a2a6b96695dcf11d731c5be9c46d8db07a9af95edbb042e9dd166c3b0be4195bd71b34165ea0306621beb67e4eb316d777fb6c0da1696d38247b9b4c25d1c1c077484ea5e5cc47cd1", @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:56 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66aaf5b6643d0000000000000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69243dda00397106feb7f19af8276833c3baebc2353398a21c84d4a5dddc6c9373ffb5889a4aa6463735c66cd9cc5a0f226a37f97d139ba35162eb8c7ea42d19", @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r4 = dup2(r2, r3) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r5, r6) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r4, 0x84, 0x78, &(0x7f0000000140)=r7, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 600.188986][T17142] fuse: Unknown parameter '' [ 600.202565][T17142] fuse: Unknown parameter '' 14:40:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:40:56 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYRES16=0x0, @ANYRESHEX=r0, @ANYBLOB=',rootmode=0<000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="a228"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000340)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x0, 0xf0, 0xf0, 0x1e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x6, &(0x7f00000002c0), {[{{@uncond, 0x0, 0xc8, 0xf0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xc8, 0xf8}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x5, 0x4, 0x5, 0x1}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf0, 0x130, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x9}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x3, 0x0, 0x0, 0x8, 0x3, 0x5, 0x9, 0x1ff]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x650) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) mknodat(r3, &(0x7f00000009c0)='./file0\x00', 0xa014, 0x7f) [ 600.290079][T17157] fuse: Unknown parameter 'fªõ¶d' 14:40:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 600.376589][T17157] fuse: Unknown parameter 'fªõ¶d' [ 600.389670][T17164] debugfs: Directory 'hci0' with parent 'bluetooth' already present! 14:40:56 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x9, 0x20}, 0xc) prctl$PR_GET_KEEPCAPS(0x7) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f00000002c0)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:56 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x32) dup2(r4, r5) ioctl$SIOCGETLINKNAME(r4, 0x89e0, &(0x7f0000000240)={0x0, 0x3}) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r6, r7) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000340)={'veth0_to_bridge\x00', 0x200}) ioctl$TUNSETGROUP(r0, 0x400454ce, r3) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r8, r9) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f00000001c0)={'team_slave_1\x00', 0x200}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='f\x94se\x00', 0x10, &(0x7f00000002c0)=ANY=[@ANYPTR, @ANYRESHEX=r0, @ANYBLOB="2c72046f746d6f64653d30303030303030303030303030f8ffffffffffffff30302c75738a5d4edd7a11", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB='\x00\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:40:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000140)={&(0x7f00000000c0)=[0x7f, 0x0, 0x0, 0x6, 0x9, 0x0, 0xfffffffe, 0x1e675a41], 0x8, 0x1, 0x400, 0x2c4c, 0x200, 0x1c, {0x3000000, 0x9, 0x6, 0xd400, 0x400, 0x28, 0x8, 0x0, 0x60f0, 0x9, 0x0, 0x8000, 0x81, 0x7, "d8267dde995604ec1f3588f325987fdb2e65f552465e547c9b710503cc5922ca"}}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000001c0)=[@mss={0x2, 0x9}, @sack_perm, @sack_perm, @mss={0x2, 0x416c7c03}], 0x4) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:40:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:40:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0xffffffffffffffca) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:40:57 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x8000, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:40:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:40:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0xe7c, [0x0, 0x9, 0x101, 0x1f, 0x5, 0xffff, 0x8, 0x5, 0x2, 0x5, 0x4, 0x7ff, 0x0, 0x1ff, 0x9, 0xfff, 0x7, 0xfe01, 0x2faa, 0x1000, 0x7ff, 0xb4, 0x1, 0x7, 0x6, 0x81, 0xfe00, 0x9, 0x7, 0x3, 0x3, 0xfffa, 0x80, 0x0, 0x0, 0x800, 0x1, 0x401, 0xa43, 0x1ff, 0x1ff, 0x101, 0x3, 0x3, 0x1, 0x9, 0x7, 0x8], 0x7}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:40:57 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 602.447805][ T12] Bluetooth: hci0: command 0x1003 tx timeout [ 602.453914][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 604.527847][ T12] Bluetooth: hci0: command 0x1001 tx timeout [ 604.534090][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 606.607866][ T2878] Bluetooth: hci0: command 0x1009 tx timeout 14:41:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x2, 0x100000001) 14:41:06 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x5, 0x7, &(0x7f0000000640)=[{&(0x7f0000000300)="c8de30065b2de2ff1b5d723b1340f05d23146389971d46ceeeb141eeeb878d18f7f5a57e785ddd71125ee254f55e9c2c1e7dc312bec41edec1174ceffa91f55f75bc6ce40115f13c96b20114bbbd5e4414707121344be1be5d205a9dc1f67a161cfa567f7c7b59edc23e24ab680fad3739bfcecb4a7a3f32a7af67291267492ce11148e1069477ad3d93320bc25512f47aa887b3b8326c2b480cc2e8cd1f837aacc5f994fb2c8ca1116442fc0250fc7c756732", 0xb3, 0x11e}, {&(0x7f00000003c0)="fa7561fe7295e7e850b852d97b07f9b1cfbfc798eee92db9c243041c208f26afab6ba419308b05", 0x27, 0x80000001}, {&(0x7f0000000400)="6b665ab8a8748d6585d60497a1593fa4d46a", 0x12, 0x1f}, {&(0x7f0000000440)="0ff876abc473a6965222e700fe45566a0d28e36ce07cb328a766487b84e71f2775ded78ea31478e4307c585bc2064ad55c3b460b56ee76754fff67a5695a82055dffea2a7846c65ec7", 0x49, 0xfffffffffffffff8}, {&(0x7f00000004c0)="ba11321b06ca32cb5a85ee0ff1a742146a5e571ae81efb9053b082adb1838d4778f92eae8d623d3efeb52882264884511bf5304b8f879f17199bf6b75ee5bdda0308b8da707a5da0d91accb348f352702b", 0x51, 0x3f}, {&(0x7f0000000540)="a9e8d854a8390e883b71555d63a4c92bb45862f45fd47e8c82cf954039633f9368c3cd6db8f2043a9b6937f0e2c3f9f9016f1b255be0d4096bf375a8b6a90ed814ed349e", 0x44, 0x7}, {&(0x7f00000005c0)="06726c534146d0531b2f70df09226149bd53fd634f94729a2ab6cf21de57c289c03f3ac30772f605cea09c3defc9124a42fcade374c69ca84d72414da4721d7a53e0ca1dc0a13f9e9faf9ebf95e02e980a9905948607d46f88559d4b785ffad8fa8e3df7d9e1ff55b562f2c3f625720c64ee472ee41c0c56c095f35558", 0x7d, 0x6}], 0x2040000, &(0x7f0000000700)={[{@case_sensitive_no='case_sensitive=no'}, {@fmask={'fmask', 0x3d, 0x41}}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}, {@dmask={'dmask', 0x3d, 0x3}}, {@case_sensitive_no='case_sensitive=no'}, {@errors_continue='errors=continue'}], [{@appraise='appraise'}]}) 14:41:06 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0xb8cc7f03b5908fb4, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000240), &(0x7f00000002c0)=0x80) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="390b0097a500056ededa3d8b34cb5eb3a0"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, r5}, 0x10) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r6, r7) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r6, 0xc0145401, &(0x7f0000000000)={0x3, 0x3, 0x8000, 0x3, 0x80}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:41:06 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x40c840, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f00000002c0)=""/244, 0xf4}, {&(0x7f00000003c0)=""/121, 0x79}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/29, 0x1d}], 0x4, 0x7fff) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000003c0)={0x0, @empty, @empty}, &(0x7f0000000400)=0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000440)={@rand_addr="86831aff0d1a19937233c3a9287587d1", @mcast2, @rand_addr="c0bb726fc2d2f5e271975d230067c9e0", 0x7f, 0x2, 0x4, 0x100, 0x0, 0x100200000, r4}) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:06 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x21a840, 0x116) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000240)=0x4, 0x4) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d77f1c321b1484c9bdb56da451ca1c6044cd30b76f7a28729c2417e2262846606bc6e1416e847f8d84dca76a0bc520cb1241ac95334f6dea1e8c62889e3fcdeaf8ed73ec767116b144acd51bc96247a2ac49d3a16a01620c03d93231a9fe0801d05c5828d118e32cd4eabfcef2965258cbbed8a7fc9553e9d460e1be49f", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB="1010"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x10, 0x100000001) [ 611.110045][T17262] fuse: Bad value for 'user_id' [ 611.151215][T17262] fuse: Bad value for 'user_id' 14:41:07 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00\x1e\x00', 0x2, 0x0) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB="2c80"]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f00000002c0)=0xc) capget(&(0x7f0000000300)={0x19980330, r3}, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x401, 0x0, 0x9}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r11 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r12 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r12, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r11, r12) ioctl$TIOCSBRK(r11, 0x5427) dup2(r9, r10) ioctl$SIOCSIFMTU(r9, 0x8922, &(0x7f00000004c0)={'netdevsim0\x00', 0x7f}) setresuid(0x0, r8, 0x0) r13 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r14 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r15 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r15, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r14, r15) r16 = accept4$unix(r15, &(0x7f0000000500)=@abs, &(0x7f0000000580)=0x6e, 0x80000) getpeername$unix(r16, &(0x7f00000005c0), &(0x7f0000000640)=0x6e) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r13, 0x400454ce, r17) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000440)={{}, {0x1, 0x6}, [{0x2, 0x2, r4}, {0x2, 0x1, r6}, {0x2, 0x3, r8}, {0x2, 0x1, r1}], {0x4, 0x7}, [{0x8, 0x5, r2}, {0x8, 0x4, r17}], {0x10, 0x1}, {0x20, 0x4}}, 0x54, 0x1) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:07 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) bind$bt_sco(r3, &(0x7f00000001c0)={0x1f, {0x20, 0xff, 0x6, 0x0, 0xa1, 0x5}}, 0x8) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x4c00, 0x100000001) [ 611.231745][T17273] fuse: Bad value for 'fd' [ 611.250294][T17273] capability: warning: `syz-executor.1' uses 32-bit capabilities (legacy support in use) [ 611.370959][T17280] fuse: Bad value for 'fd' 14:41:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x4c01, 0x100000001) 14:41:07 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="010900008d34b97c743132", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:07 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x1, 0x1) move_mount(r3, &(0x7f00000001c0)='./file0\x00', r4, &(0x7f0000000300)='./file0/../file0\x00', 0x4) [ 611.574325][T17291] fuse: Unknown parameter ' ' [ 611.644171][T17291] fuse: Unknown parameter ' ' 14:41:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5409, 0x100000001) 14:41:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:07 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) lstat(&(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0)) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = syz_open_dev$cec(&(0x7f0000000340)='/dev/cec#\x00', 0x2, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000440)={0x16, 0x98, 0xfa00, {&(0x7f0000000380), 0x2, r3, 0x30, 0x2, @ib={0x1b, 0x2, 0x800, {"d28ca5914ae444375499a29bc82f1491"}, 0x7, 0x7, 0x7}}}, 0xa0) 14:41:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x540b, 0x100000001) 14:41:09 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f0000000240)={0x8001, 0x0, [0x100000000, 0x1, 0x0, 0x0, 0x7, 0x5, 0x54ae]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:41:09 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f00000001c0)='user_id', 0x7) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:09 executing program 1: msgget$private(0x0, 0x100) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75700300643d", @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) getegid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@rand_addr="1d9455fae3f0c583a431758f5729e625", @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x4e24, 0x3ff, 0x4e22, 0x1f, 0x2, 0x80, 0x80, 0x21, r6, r8}, {0x6, 0x4, 0x9, 0x0, 0x867a, 0x900000000, 0x9, 0x3}, {0x0, 0x6, 0x4, 0x32ae}, 0x90, 0x6e6bb9, 0x6, 0x1, 0x4, 0x3}, {{@in6=@mcast1, 0x4d6, 0x32}, 0xc, @in=@loopback, 0x3500, 0x1, 0x0, 0x2, 0x5, 0x2, 0x2}}, 0xe8) fcntl$setstatus(r0, 0x4, 0x80000000002c00) timer_create(0x7, &(0x7f0000000380)={0x0, 0x3d, 0x4, @thr={&(0x7f00000001c0)="f62675ce6426a7fc31cae7848c69726420df7513f3a0b3edba103c9891a74334763ffdd820f5a8db2f032ff323d03d39f5b2453967f7c30c7ad14f91c42690eaaa2638208b66c1a858f4e821887e17ae29885c5c0cac4cca2df0a7751e4e3e1da2b02abf55944ccb7b44d871ed9a85739ffa10b1ae7a66224b368e9d0103e4da8de663dae5abf85730e45a77bc9ee5d91c01de1767434d6d35ac4bf0d58e2a63fb3f32a83758851ac6ed269f8b4ccada7efa0d598160e94018e37f1919", &(0x7f00000002c0)="814e6f1fb001bde3152c4350decf9a73f049e4f03e8d9dd9d2f5b29425ef39f61865ac90c24fd71b3b593e2e207bc9b7afd35dc382ca0899c8c451d9246ed6d2de5dc253f0f9950d96dd26b17394ea8db70239179993020deacbe9f076afaa2dcf25f8c671b160f644584f4c34d6ed55d7fdd84e54ff6bd603de7abbebba108433d7f54c937ef1ae7138cab507de4e22ee151917987c8c0c1cff69ae207fe5df70d748f0dd0b6340d54e7bde55d68a59ae1b644705b09255c2971f8eaf"}}, &(0x7f00000003c0)) [ 613.929245][T17323] fuse: Unknown parameter 'group' [ 613.983726][T17329] fuse: Unknown parameter 'group' 14:41:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x540c, 0x100000001) 14:41:10 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) accept4$netrom(r4, &(0x7f00000002c0)={{0x3, @default}, [@netrom, @remote, @bcast, @netrom, @rose, @bcast, @netrom, @default]}, &(0x7f00000001c0)=0x48, 0x800) mount$fuse(0x0, &(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB="2c67fdffffffffffffff", @ANYRESDEC=r2, @ANYBLOB="2c61707072616973655f747970653d696d617369672c7365636c6162656c2cc43cbabc3d", @ANYRESDEC, @ANYBLOB="2c737504005f726f6c653d2d27252b7b70707031637075736574657468312373656c696e75782c00"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x540d, 0x100000001) [ 614.227054][T17348] fuse: Unknown parameter 'gýÿÿÿÿÿÿÿ00000000000000000003' 14:41:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x540e, 0x100000001) 14:41:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x540f, 0x100000001) 14:41:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="2cd2"]) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000001c0)={0x2, 0x75e2, 0x2}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5410, 0x100000001) [ 614.643540][T17368] fuse: Unknown parameter 'Ò' 14:41:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000003400400bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5412, 0x100000001) 14:41:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write(r1, &(0x7f0000000040)="0f42", 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r4, 0x934, 0x0) fcntl$dupfd(r4, 0x0, r3) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r5, 0x934, 0x0) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x1, 0xffffffff, 0x9}}, 0x28) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) [ 614.697641][T17348] fuse: Unknown parameter 'gýÿÿÿÿÿÿÿ00000000000000000003' 14:41:10 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000001c0)={0x2, 0x1f, [{0x2, 0x0, 0x27}, {0xdb89, 0x0, 0x8}]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) wait4(r1, &(0x7f00000000c0), 0x1, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5413, 0x100000001) 14:41:11 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$sock_ax25_SIOCADDRT(r2, 0x890b, &(0x7f00000002c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x7, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null]}) 14:41:11 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x10001, 0x5103b9bc0a60ea73) ioctl$KDDELIO(r2, 0x4b35, 0x40) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x2, 0x88) fsetxattr$security_evm(r4, &(0x7f00000002c0)='security.evm\x00', &(0x7f0000000300)=@v1={0x2, "e6fcfc"}, 0x4, 0x1) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 615.180552][T17368] fuse: Unknown parameter 'Ò' 14:41:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5414, 0x100000001) 14:41:11 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:41:11 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x2480) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:41:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5415, 0x100000001) 14:41:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000003400500bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="a2a100000000000006000900ffff00"}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x2, [0x0, 0x0]}, &(0x7f0000000100)=0xc) r3 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r4, 0x934, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4000) 14:41:11 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev\x02|\x00', 0x400, 0x0) read$eventfd(r1, &(0x7f0000000340), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000580), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r2 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000001040)="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", 0x1000, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate(0xc, r2, 0x0, 0x0, r3) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f00000000c0), &(0x7f0000000240)=0x4) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f00000001c0)=0x6, 0x4) prctl$PR_SET_ENDIAN(0x14, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c77886804586f6f746d6f64653d30303030050030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB="2ce6"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r7 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='c', 0x300, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r7, 0xfffffffffffffffc, r6, 0x0) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r9 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='c', 0x300, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r9, 0xfffffffffffffffc, r8, 0x0) keyctl$search(0xa, r7, &(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x1}, r8) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r5, r10) bind$netrom(r5, &(0x7f0000000240)={{0x3, @default, 0x1}, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) 14:41:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5416, 0x100000001) 14:41:11 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}}) r4 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0x800, 0x100) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000480)='tls\x00', 0x4) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r5, r6) write$P9_RUNLINKAT(r6, &(0x7f00000001c0)={0x7, 0x4d, 0x2}, 0x7) 14:41:11 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0xe47647aa84f8c9d5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0x5, 0x2) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) connect$inet6(r2, &(0x7f0000000080), 0x1c) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_buf(r2, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x80000000002c00) [ 615.958284][T17443] fuse: Unknown parameter 'wˆhXootmode' 14:41:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5417, 0x100000001) 14:41:12 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB="3900001a06d598d1cd34f997b9d82bc8d2d249382cbcfef37c38007e898bd0b011c2fca4f4eb7d4fc824f574e0c167bcb11ecda041edaaaad0e900c9134efa076960dc30ea5d011c7c1f3e963b020454b37e126867fcc41197450024f4c264a919513a5b79d7fa562cfa5a36ab93c2affa07182d0dda7bcda6c9bf6eff2dc845a67f0c63a94816efde4a85154ae0a4ed01b28f610dd6f857c90c86e472730323312a42"]}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$SIOCX25GSUBSCRIP(r3, 0x89e0, &(0x7f00000015c0)={'hsr0\x00', 0x1}) io_setup(0x3f, &(0x7f0000000000)=0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r5, 0x934, 0x0) r6 = syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x0, 0x4000) io_submit(r4, 0x3, &(0x7f0000000400)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0xb4dd, r5, &(0x7f00000005c0)="6f673966dfad440fa86d854fdbaae5aef50843241acf2db3c66002bf22ce8c86ccaabbe6f04c4d2cdc0b9c1ae1c8fcb02228f17886a89a07b5f27324a8c8ff3e5e228263f007f08da59e33ac07e428ba4ebfd42d4730806b7e23271863b5f9d11bff909ef193367a239a683983fcbeb57e3efc99a710b4835dbb37246c0054e7e1ece51f815ca6ab7f20aade2ef69341bf004bbde5af383543ce7bb6b0c5e6220ac930526d16b992fd15b2b50dbb0d19a7f815739388a95566636bc6b5a0af2aa692a4253240488050747bf2ae1e1ef2367e2456a2386bedf6ed3347ecaec5f5413e05be94f9c59cf10d4a928d8d41d49a0c65bc8d85b62698fc3ad7450cdd4e4dbf500002179f047f32463f36c13a53f46afd6f214d905b5533f389cdda57813dbfd4c2ccc55e03a2dfb7808f09ae381a4b156bd373d141095ecad84debe4442639790d2a90da08b5aeb07706952f807cc8affa8ecb218021f6d348d22d30b2340341a1b626a9dc4d40c0d5ba05a74aab9ff39e9c418476875847731669e807eef67f6036c9c730422fb00d009f8afd64d48b4da4b4686f2605ce5d85a480ee0fcd11589633e9cbc062804b350a5482d63b25aa66f57b1de4b6b4c3545de148a9a76f08f23b9bf339a63ec2f827db22c13d36abcbc18f2dad865388d03c36fa9a3c89406ba09a7ed108bccb13c32de6e2a3c517fa36b1c4e441c4c4b226dd3f488990acd6d05302c6ad77f6df3fd1967b54f74655cf70253035b00e29f99af5fd7068a543fdeaf27727dded5f4fb7ca05a7375612a310fbfca8b7dd9f84fc9107803d799b19ff5197002eacaaf8fa5d02b876e452a1af1f169fc9e865b8a69ee8b62e8fa8d3dacaeea746aff3b7db25bb77285c70e4d9703c5000e2a4478c73f56686e4ebe96e61812373293b12190a30e06f0508d0d07d22b65458d600dee91fe6377c5494420d0d5ab2d541ad5ecfade4fa5889179e67efe77be4012fdb708166da163e9d6f9eb74df038bf12126086a6401618a6bef8af70cbabc34d0ebc0fa75db807726c0f4e5864827f647df5fbe5f96eefa4d5de4c4dbf6d90f9e637b013f5332eb3c8afda96f6d280c03f84375dfd24348026ba6632742d968e6977291f792a879d4fc099ac285e2c48ecd07322c70adeafebe0dfaa6fca9b2544f8090b66cc50d7400108473a446be159979e6c3dcbfe5240984ed1d773b98847481d52b978fbf2a62f525dde00a99f0c9a09e62550dc392e30fde130138a4a3919e48f3af421cfe77c50f3d08feb537fa6be0bd15958bd2b78bf4cfbc01420564044a9ed9a96e3d9862bd32d5aee05805ab1cee1c64776156404e1a38402716093d2ef85b07f32f3eba8afbd35e9a879860f75057658c214f6f7ffc006a1a81a0157050677e0dfd601285f7ecb4a4e4a73919af4026c6fe293151cb5e926ff528cc30d3e90a1d9709640cd98f478e57bbc73d5bd5c28a9d0ac668e5a4b2f6108e92ba766ef5fd0735f61a5f56c5472b12bb55fcb45eb17cbfd47ed34f99a6243870dfd6233ab782dbde99c75828dc80b279ccf236002029b2442cd0bed6a4820a1202e18139c52550746c6c7b7b28a1fc29c14990e486c17d664036b08fa4494090b728b684dc62ba558dbce906241153fc01ce54c9832cae42407d17014e8e48627fc846d72580fc378eef8a6b80f7d59f8ba8e3f3c4603ef25f4bb931295a46910e05e8a992240030c4a90973cdd971b0afb4bf59559a32f3ba891627c761c6fed955af160c624951a6a28fc18bab24ae1c70b0e47b05cf9b77cb854cb29386959c8164997af7df0eec7f1f79785ceff71be66c7a740405f7ebbb29a235455fd224decfcf9984888fa56c6195e42c28f8f6bbe7e951dc922d02c50b8b9632ec0d21217d2b758261955ac6fb35d17583e6c076c52d781577a0aa80a057c7300bc3a91025113cbb176bb399f8badaacc57fe1e534d93c20dbb39baf35e451c0248e2163f21ac982cb1828d619750e615082bd27d691739a70b4fc7a56ab5a73a1e4b26e93623d933d32b5e4c3c516d7f82f264c883bfb3f15d945062b12fff579babb2338932e275564d04f565321e2fae4f36303ac3c7533ee53c5d1ae175f77bab45f06dc57dd5f4230c387db6fc1cdb7abeeeb3ae8c3ee3e1162b3d1c6ffaf7f4ce61a2f2213788cce5d7a65a4c83e9383b8e5ec0ac1381d1914bf369f818a1eff66fe5fa9b2ce90e3cf19b429ddb657328c344bf0d8f3f87bb5d67c17844199595e39e5e6c1ff1824ef89b0604d6bf5bc614844199eb3b350b9596b3afa41b4cab970e2b47179748a39c83eaf8307391f8ee2bfae37818041584cfedb693f8ff640db21d07226e602e2747d0f747b7a7ad5b2a387896749eb786fcf9936d22068e0628e245f690a8c54a3333c1ced6ed6e86ec38bffe76a0374bb785710ea0b10b7864d515ba37235c08153c4ec2f4af45c07bf549b9da59b80defa9c7283a20db9e7e01ef6dab1ab4cdc05cf7b5b7989191889f8f61fafbf57c4c659a8244d8ff2c610cbd4fb7d2dabde34c9ac9f3b2820e9de8f5115d7d8878e93cfeb694ca96c5288100b01fcc622887d10014239c3aec043e9dca67919f9f6e115f0cc8face19230ae3a3aaa9b0b7752274c225e1a1a32a4fbb66d76e3aa3c4c43e6d3088720fab33bf89d90327032d1b82af15d9b2723f4e6ca69653fa3dc0d740f652c07df5e8c4436c726fcb2fe211b0462264bde3a3d0e729f29bb1e7e1aaffb719c9bf8013825e91eb200e6be41452d2da2a73e0dda939c00139b2cac6a7337d0968f0bf9ab7ea36bab040c3f96151c90dbe04590c27e2d0f4f216bb4d313e96a50bee666d1422fb3c67ba505ed5bfd0540d9e45b6b7a8fabc72bf1e8367961500de82c7b562d3628d594832cdbae51d75a8a082eb15fd1be308348cece3a33574a5e50c40805e4c5e6172edab086bad05cafbd189f0d43f955c2a7d0afdc87cbf688ca8b1811492ee74ca1d556a2e3a8787e981c8af49c785c0d4edd4e51d6cb6f44243964c864332bc45e1fe114728a56b17d0cf5847415a6b4e1a6c2633239e0c48986cda7a55b5d24496805db3a5697b84c2b4f55382f42ecc33f15b56cadcb7475c420fefd9ab41934ceee581be12dfde43c2ac6e9ac7f7b5a41f93b96d1f85c1810b25c1d109a5d636b5bfd7a70f01561bba7d2f033acf350fb1b0f549c872ccb77613495131221a5e8c4478f63e5367199fe5aa969af4eeb74af143e2d7e213c727fcae39a281bcf35244366d036e656e0075604903c5a5ffb73fc986ce8121045801cf353e3f1049c83aa698e5ba6661028a3938a5176f61977330a6cee16979d2785d7f594a2aead901b2801451fa154740e20e8ee4f01783f0ed721286b34b8e86fe0199607db8396fae101e3802e02c8c5de3c0ba352f1dfcc7dbf33b313f51d008670dbd93d6ec6d3a56c0d9f84cd60aa5e2e75472b3a8df6a7ba03794a7cd9799fd2ba4e54255661d7bab7e5b72acfd75c647e5e558102c53b14784ef8a778135479eeefbe3bfa142cf47d1f701d077cc572404e3960df6b52a688df63edffee9a27206ff172162f718ad86566f875e3d3cece30afb098bfc91c0fdd37a9bfe7796b7a85fd2cc9cc41e0c4ac3f17061bdaf72554c839a86c23fd6f32eff26eaab1bf943889e600909d645d3da2e2b3bd1c32755fa5e7a07d04ca3d421d376248576a06067cd37574384b36c2620317b721af21969ad527017b25f9718b0781ba37067d616bed1680d621bb2099f608ba1e20acdec699cdda523b6044442608bd8bb4532a8e13788aacda6ee0dbb2f26109ec4373a9dd4b5e9fabe4d81a9cdeb9c9457b171c71ed61af10289b95d57165f1fbeff92ba2872d2d46feec1f2be3340a8838dc7e3695855f81d5e55bfe2bec290b2ec096709f2c5e1db906964dc4bcd812a699a63f4c09b1ea5ec4fab343380ddd03f3af173772cd3d0f5e3987f7737e87e802ff8e18a4a0f719e40962609983f8d6c4c7f65850ae3a3ceccce163232c655488b0243722dd1412c0fe97d56ede6ea2e533a4f5653d149118a5141758c03e642b486a3f3fe0ea00aeec0b820bb1f6a8e17b1bf7b391a66c7334e1ce0b4159cae0dbbf288dd1a21c5051826d965a7350cd5cefe9aefdce43cb761a030c0e0211b17b5a342758ade1c6646cd9ac37dd2b4944054672f78ae0f68df338da56ae8ee22149e8735fe4bb962c8eab0f92a7847c8f4b70b482d78b6d547e35618f87f3bb8cb29d783f10d72ceee7e1b160063b9bce4e0313448344f9ea78feb26d04d46c3f6d5444985bad3dc406e812eb4d69c1c42435e3c3b563a931c43ce30ab82b6818f5790f3d8512c679095f53e7fce63d83f25343c91946129b8175c51362d88500c20a85451b59bcf9c46e28956cb38df98f8f89c955e386beee767f860edea46749c466f01589f8012af7fb279e6f03dbd12a084be0b748589be30b672c8ca60e34e839945652ab8a4afda8f276ae832a741b4c8b30d4fc42c03d2f45eebbdab36d7077134afbe6ae39d72f3e8361c7a91bd748f195ffff0dc6b521164dd3982cb9798ece3e4d52f995aa6a79783519c7484b53a95956469dae48e2061008e06995dc56e64df815536d3843823c56ba554a9cefb39f652b52f7957d65c330c9af46d8afeda37410acdcda08aea0788e398abbe3f07d23b7daa2b0b15856548643a195e503fc51097eb33a2edeeab1470a9022a6563c6131e25c3d59dc10c964742987a2d5aefe9200c77daed042337f05afee58a30e11f00ace81364b4c0669cd35994174281aee3a0216745c89f27dbb9ecc91a3ff63c37ff89e66830f916e81f485caff65d4c0aac93576f44df1549c66958673d1431f8cfd6e1a1e470f5eb751a6f8609e01c394282f1b9df8d3ef7fa8c2ad9ba453a0fac582a76da2aeaa21d84bb832f244dc0a9fd27727bf2f5eb4146d0b253aa17234b790fbc4346900d8efc62d05b5a9b7d8fb44935556dd65d04344da152a097e3f6669465593edd2149971f59d9565d9882ca3dd4a911c74cee5c9c02ade99f213e5b730a73d9299c821fe1bd8ac03504675b25358ecd2e3d1c46628bc8f59b587b414b9a6c2a63e09981861c72d594029d40dad6017ac97a2773ccc362a98e91aff79daa3b4ae72ec59e476b4404be606e2d16c83a51dda8e03196d06e7d15ca276f5213c87e21b7334adfa16c6c5dcccdf4c7653694d1560d5485ed445786042108e58e9dcd30216a6fbdaa1dd9e4ce3fb25f386c1d4f8ee46eb704e5424c0b21a97a51a6c9d4b39441fb2c3259c64dbe2b0ba35dca68a8b4be09798ea3a9d77ed9b39a3b4553d939c5e016187d63bbd3260937262c79384f42c416deab1fc78061a8a82013180c350ca58151100b7a8168597d9b75b86edebd2639b8d9463904d5dba1b2e29393e3864880e68218387ce5020b8dc5759e2038597653ef2a10e8f57b86361dd4c79ae1b4c66a4a4bd12cff796e60d8cfb88a677cbf13c48ac47cf417360a0d14bde8b171a6faa4b45b5f508288b1c32e7fd984dd4f3d8081698c79439c2d82b617c23e82d5957f1501fdc95d41bfdcefcbba5eb043677f8b838fa3928972ccdb13ee8882dfdd2e77927bfbf6e9b2d5bd8a204ff9ee8b3cd990b6531614f9d2b922e87885f9869326ed2d88ef43f1cea58e9f5d5b3b226e91c6d6a5933b9c73b388f0116effd6dbad556bd648f879508f1a42922d1d2a49763392b5c7eea71c18ef53bec9cef6fae46149721a87355f0b139960e55fc78c", 0x1000, 0x1, 0x0, 0x2}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x2, 0x8, r5, &(0x7f0000000240)="273cfc21fa8fdef2aaac9ebc8bd837a52d2b1afb2b40f4f16280e91e0da3513f67b75e9b3d80956c908c88d74b7cea7b2f28d883ea54b1213b49505d3293da302c28f1179adc5efc6c142853babe3169a598fb666153f6ad0055bf923eea3ba17879d13de31759467ffd871e2154d661387c5bd0458f04414a51e90f986312a3992cd617b0aecf741d4c8b0f1ad5087314d53954611f9478237293f20f14270ec63ab6492583", 0xa6, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x5, 0x56ab, 0xffffffffffffffff, &(0x7f0000000340)="f6172439953406a91c40055a110b71d01fda274a305e3b0f745fcf926c00868edf4e7ae5f450f882236e01600940b8b411b1e5", 0x33, 0x101, 0x0, 0x1, r6}]) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r8, r9) ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0xd0) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) 14:41:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5418, 0x100000001) 14:41:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x541b, 0x100000001) 14:41:12 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) r3 = syz_open_procfs(r2, &(0x7f0000000300)='net/ip_mr_cache\x00') getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000340), &(0x7f00000002c0)=0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$sock_netdev_private(r2, 0x89fe, &(0x7f00000002c0)="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") 14:41:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x541d, 0x100000001) 14:41:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:12 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) syz_open_dev$binderN(&(0x7f00000002c0)='/dev/binder#\x00', 0x0, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) getdents64(r2, &(0x7f00000001c0)=""/13, 0xd) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:12 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:12 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2ce7723a0dcd85cfd364", @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x541e, 0x100000001) [ 617.024476][T17532] fuse: Unknown parameter 'çr: Í…ÏÓd00000000000000000003' 14:41:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/\x93\xd1L\xf6kve\x00', 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000880)='/dev/ubi_ctrl\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000008c0)=0xffffffff, 0x4) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x8, 0x0, 0x0, 0x4, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x8001], 0x0, 0x26882}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0x6f, "7469c8e7779697a5cd204a34fe37c5c70f102e5d14bd5c3b2f6e302db8cc2d72091bc1aaba6c655672cbeaf067b0e7a76dca45de6637b9a92df7948053249f9ce2d6940af10337f10b5bc56ff46369b5806753f343e306ae936ae560139ffacee515c0999bc75218fa5e087e63c622"}, &(0x7f0000000100)=0x77) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000002c0)={r5, @in6={{0xa, 0x4e22, 0x0, @rand_addr="4595923cc617999783f0b7588a0cfdcc", 0x1}}}, 0x84) 14:41:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x541f, 0x100000001) 14:41:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x880, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5420, 0x100000001) 14:41:13 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @host}, 0x10) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 617.534535][T17523] cgroup: fork rejected by pids controller in /syz4 14:41:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00') 14:41:13 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000001c0)='bfs\x00', &(0x7f00000002c0)='./file1\x00', 0x8, 0x3, &(0x7f0000000500)=[{&(0x7f0000000300)="d02c1d114dac9a65352239866d56696b8c408d0d02e2eb503e97aae47c387667c33a5c2bf0dee010fa51eb241626293fa7c40a21977fc5ff44b777b969c1f0c147e0ac", 0x43, 0x4}, {&(0x7f0000000380)="dcf6400969b066774bc73773af5896267ee2ae5ea9044aa992aea926403b03dac1b25c930d53f5efb0932e817b54f48b49734e46827565d644d588d6e756bbc9f44a57c110ea821d2f8095ac79349a7c5824d643c5d08160d82805fcb623578294ba337cb7141482b073fc57c4dc9ba47188570ff153e73899fd", 0x7a, 0xa6fc}, {&(0x7f0000000400)="61593612cb05a54bcd80fcf13313e17e16a66f2af7b1a779c91de1d2af16971d314acecbefb9cf91aa1ad5a1f2fc502f9c8b76c677748d31788d118763e06744a2696106e21d5b1548bb1e4d5da53df1caa400566bcd7580c17c13046e5746977ea684c9f16b9740a23522cf9772b56d590c32e20e9a4fb1eb741cfdb31ca044064c302e56656b86da5b945fa1a02d08da21ecee34191dc3b005e99ff8f2947cf8d6da08a72b766e7edcd4ccb4b7f4734b9fb916852be6c8493e62a1aab9ce1b799ad8", 0xfffffffffffffe67, 0x7f}], 0x800, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 617.841281][T17575] fuse: Bad value for 'fd' 14:41:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000003400700bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5421, 0x100000001) 14:41:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000040)={0x2}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x934, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r2) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f00000002c0)={"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"}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) r6 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_GET_REGS(r6, 0x8090ae81, &(0x7f0000000180)) setsockopt(r5, 0x5, 0x3, &(0x7f00000000c0)="6310eb1ebd540b826647106036438e98f209faf287487801c8d9ba26f142b33660e04cf6211ffce8390bebd09736539a900ed41fcd979dba84636b242cdb633263b06996262cfa600caeeedff6fc6d9ce5170b2924b37d709e516a22a3", 0x5d) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:13 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="5600001a060007000000007700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:41:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x934, 0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x934, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r3, 0x934, 0x0) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r4, 0x934, 0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r5, 0x934, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x10080, &(0x7f0000000540)=ANY=[@ANYBLOB="827f0340731d03e901be2625c09dc51343a99d0ca60258515cd317f4cd3d46efe8c15af99dcc54ff74d1875da13ebb89be7dd5665b744e8823937e04f90015e2a2b4c303904f0cb9dc8e4e2f9d25cd4c573dcf384d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESOCT, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32=r1, @ANYRESHEX=r2, @ANYRESOCT=r3, @ANYRES32=r4, @ANYRESDEC=r5], @ANYRES32, @ANYBLOB="3bce92874284ffc20000"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x141001, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r6, 0xc008ae05, &(0x7f0000000340)=""/227) [ 617.957251][T17569] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=12365961) [ 618.013450][T17584] fuse: Unknown parameter '‚@sé¾&%ÀÅC© ¦XQ\ÓôÍ' 14:41:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5422, 0x100000001) [ 618.079461][T17584] fuse: Unknown parameter '‚@sé¾&%ÀÅC© ¦XQ\ÓôÍ' 14:41:14 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x934, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r3, 0x934, 0x0) r4 = fcntl$dupfd(r2, 0x203, r3) ioctl$VIDIOC_G_MODULATOR(r4, 0xc0445636, &(0x7f0000000300)={0x5e, "126623550575cd95a291639ea2ac6b23a35d146ca86b728881bc61d48cd868a4", 0x10, 0x64e3, 0x3fb, 0x8, 0x3}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'g\xb6oup_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:14 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060400000001001600000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:41:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5423, 0x100000001) [ 618.355877][T17610] fuse: Unknown parameter 'g¶oup_id' [ 618.397182][T17610] fuse: Unknown parameter 'g¶oup_id' 14:41:14 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) getpeername(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x80) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x109040, 0x1) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:14 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f0000001900)={0x3ff, 0x0, [], {0x0, @bt={0x7, 0x1a, 0x1, 0x2, 0x3, 0xff, 0xe52d, 0x6, 0x52, 0x5, 0x9, 0x7f, 0x0, 0x4, 0x1, 0x1}}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r2, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$kcm(r1, &(0x7f00000018c0)={&(0x7f00000002c0)=@can={0x1d, r6}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)="b74f04b401de15bb349616f11d4235337515a9fbc49cad6ac454f4393d8c335a6ad60fcd0577d160a2bc38b5b427cf379f0884cca73a5dbadf7209ace2f4cfd40ae4a65f41c31cc510f4a5dad5c5c475fffbfc054bcc4a6fd90eed4812f43562b5f3e6493dd801dd35584e0303b29fc2da9b012a77aaeb941748c999981d25d9371997c58262a29cff6c04f6ceef2fb705c1e45f5bf4bef1062b5beba7c87ddbf369783b37f2ae4ab165198f3ea9eff752f2bb1e", 0xb4}], 0x1, &(0x7f0000000440)=[{0xe8, 0x0, 0x7, "8a3ac2fcc1ba9e46e89508a4770d5961309a9d054e2b8c434f821633085f904710b14a3de16e2c97dc3ad6cd2157ddfd9804361010e24ea787b7b7506b538a3076aff3d2b2323e92886bdca06e90041e4fcbd36cfab4087ed6e17de858ab57ad04789a2b57d95c729b96ccc34101a8dd81846cb14a4d64b7acf1bcb96523d589811971d0becb4b0de73ec2b924a080e211f7e6806abc574d75ea95194700169b4c6da8cfd74a13ed5d7bba8d58dd6a67e7804dc4fe55fb5fb39f6f2b9a5e1b8061b7a1b20373b76c8791da72c1b803562a29"}, {0x80, 0x29, 0x2, "3287b343fb4df4cef43fc3f5764f5e598ce56d0c9656618dbfe7d5c8154f87afc491f78e5a4c14b94124bf4f5076c929432e83fcce0b3c65eef620435f26ca4382d3ce4e8cc68eda8787ee0ff64ad21f0b4a2443bf885ffede214787697698d1b71e25251532f1cb1baed26740ef76"}, {0xe0, 0xff, 0xffffff64, "a102fb9868e9a082e0415b7a8c516e453d54d9940108ef548780238b02b2bd228217b7bcf3f3fa897a581bed3e4d4255eb62861813a4d03d0b3a79b60779b0757ed00548a3d957cfe7c5f9c49625f0ee636708d74f7a762c454831447d420e68e297b946c1b2484076b586c5955ef8b798685496fbd1fe23042e5fdb10be5229763373ce4295c3e8fc896b3f97307c75d04809cd33a887ae3f0099c1186419d2e3bf62528eef9a61f3e0943a8f9c1c2d1618523a4f866c929084c4bea4d53b0718ea0ee74e1c669c94948d9f088bf68c"}, {0x90, 0x8c, 0x46, "8e196be1f19a9de63e8dbbfac052ad29d3ada1f8b442c1ae7118e134bd66a524572a4cb7e5a03e399ab4a4575e923bc21fe066aaa773a6c14bd01c7d46aaa51895bdc75488e1f4924fff05d2bd04fa2e4a9a5c58e5d813d1f0938db1692bcf8df4ca0da3b2f26b9ed447edff0d2be9460b39e05a7073d9a8f7"}, {0xe0, 0x101, 0x4, "e1506183a7287aa4df74881ddab5aafeaf5afa48698fc9c5e366d012f915a4a95422babad15b803d76ff1da75ccc3a6838ed986ec278d4dfe30ad5fcee7df260656251cd4a43d31ce8d0710b2b51764d9d4cba2ff95682e241a4928f8afcd0cd8644ed986a06ce4a3137c8325c42c398f35dd0a0527390c6100ff80b88b564c14fc52742267dd3dd27ba15c25c6e0469c93b7e800bf3d4e41d87803982f1e8fc29a878d3b83dcb64f5edff8b6574a8a015e029cec13669bfe0bd4d895b067f0630ed29467410d897ab58ce3193288b07"}, {0x1010, 0x0, 0x5, "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"}, {0x88, 0xb, 0xecfe, "c5290ab89c42ad4a5eb9bbe8a339bba9ceb9ec4e32b5bc5fb03576f4f236b73155462d176a52f30ea162f65ab63bf77b910a159fa7670715b77e4f01dfe04955441ca8b6a3204cf2e4cea8b66e1fce57961e35af6dd518f3acab484a70fa39104866d5a3ac8cb876156e1f085c3ebc4d67"}], 0x1450}, 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r8}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) truncate(&(0x7f00000001c0)='./file1\x00', 0x1) 14:41:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5424, 0x100000001) 14:41:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5425, 0x100000001) 14:41:14 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_MODULATOR(r3, 0xc0445636, &(0x7f0000000240)={0x0, "d037ae1463ca739bb61be7cc11f380e907030a0e5025e37e32aad8ecc70ddca6", 0x2, 0x54, 0x4, 0x4, 0x4}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) kexec_load(0x3f, 0x6, &(0x7f00000005c0)=[{&(0x7f00000002c0)="9e0d98e6e09675c24a8916efb0aac11f3d0bf3fb393266176b8a32b9b6a168044f9f6fbc858a653788ee57229eda7889fa6e90c8a1166c3fe46e590d7b50045e63029825cbcf9b5609c716620103b4ec8d2dc46eb51a3c7bcddb88a85819cc09494e24624018495f9a86c28b029af5e02ab3dca1c670f6f93f7fcb7e3c28c2be12f57ce289943357f6fc1394e76b71e76a76b294d28273713056d3391755bb27f31e19351ddfe25fc968403a6c918e87d021f68d0c70ff20eddfb3e66db114e711be828d21e12f37", 0xc8, 0x7ff, 0x401}, {&(0x7f00000003c0)="f8feaf40faf2adb4bb75060c358606ead90242576ccd91914ec9a3f038190cffd977455d6b4d05faa2fd742ddc67b290932a2f2b3ac2413c38e5afb4ca2355cd104124133e2bbf2ccb65f183fee0f012051c33a8a3472500c82e20329e4ffd5ad983f8eb90ab69fe801f7d6c9f5ea8a8f3da3eccc94e7c", 0x77, 0x5, 0x6}, {&(0x7f0000000180)="55778c235019c08048682645422652d45d9d50585780d1d88e6a3aa79347c8f163ca8a82aa5295f823644ab1996f7af6d131622b314cbd9b2bb55947", 0x3c, 0xfffffffffffffffa, 0x10001}, {&(0x7f0000000440), 0x0, 0x7fff, 0x5}, {&(0x7f0000000480)="045b2d0604bf878dcab54539092e2e5fc0cbdc1ac9665c0b", 0x18, 0x1ff}, {&(0x7f00000004c0)="e746246a2fdb926c824f9d33", 0xc, 0x9, 0x6}], 0x0) 14:41:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r6, r7) ioctl$EVIOCSABS3F(r7, 0x401845ff, &(0x7f00000001c0)={0x5, 0x9, 0x1000, 0x100, 0x401, 0x8fb1}) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r8, r9) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) r11 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r12 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r12, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r11, r12) clock_gettime(0x0, &(0x7f0000001000)={0x0, 0x0}) recvmmsg(r12, &(0x7f0000000f80)=[{{&(0x7f0000000800)=@caif=@dgm, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000880)=""/6, 0x6}], 0x1, &(0x7f0000000900)=""/238, 0xee}, 0x8000}, {{&(0x7f0000000a00)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000a80)=""/211, 0xd3}, {&(0x7f0000000b80)=""/227, 0xe3}, {&(0x7f0000000c80)=""/86, 0x56}, {&(0x7f0000000d00)=""/154, 0x9a}, {&(0x7f0000000dc0)=""/161, 0xa1}, {&(0x7f0000000e80)=""/125, 0x7d}], 0x6}, 0x8}], 0x2, 0x16143, &(0x7f0000001040)={r13, r14+30000000}) sendmsg$nl_route(r2, &(0x7f0000001200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000011c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="040100001900000427bd7000fedbdf2580001000fd01c8020020000008001900", @ANYRES32=r4, @ANYBLOB="0c00090001f87f00", @ANYRES32=r5, @ANYBLOB, @ANYRES32=r10, @ANYBLOB="ff0000403ec599ba8cc77b000500000008000400cf3bdb1c17b5e8de718846ccc82d0881c9c25da10b692851a2ceb5ae5b7463dc0ca60b0c80", @ANYRES32=r15, @ANYBLOB="0c00160008000a0001000000b00008006022eef64b652fca6e2b13088a3f8b8dc95305e439c966ad1427fcd38f431bc58247c30959b9dc783dadea673ca0e3edb998703b82b766487818736227582ebcef6124967ff34b081a5f8501b13fdd67d0b1a6339019a95ea867b55d845fe5e5123b9e30c666346a8f1b090216d61941d4b94b55daea178e238d2c7da57a8afb18958d48c532ba7c4b2893a3c5772f3b85cb48d23311c84220f92b9e2a80a52417657fa20d12dedcd0220000"], 0x104}, 0x1, 0x0, 0x0, 0x40}, 0x1) 14:41:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5427, 0x100000001) 14:41:15 executing program 3: write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000240)) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) openat(r4, &(0x7f0000000000)='./file0\x00', 0x40200, 0x20) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, &(0x7f0000000300)=0x6e) r6 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) eventfd2(0xfff, 0x2) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r7, r8) ioctl$SIOCX25SENDCALLACCPT(r8, 0x89e9) ioctl$KVM_RUN(r6, 0xae80, 0x0) 14:41:15 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000002c0)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5428, 0x100000001) 14:41:15 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) mknodat(r1, &(0x7f0000000100)='./file0/../file0/file0\x00', 0x1010, 0x5f) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) getdents(r2, &(0x7f0000000400)=""/173, 0xad) lstat(&(0x7f00000004c0)='./file0/../file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="4b61e8e152580b486f28019cf00b3ed9169110c4a2054bc86a", @ANYRESDEC=r4, @ANYBLOB="2c02"]) mkdir(&(0x7f00000001c0)='./file0/../file0/file0\x00', 0x20) r5 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000000340)={0x0, 0x6, 0x0, &(0x7f0000000300)=0x2}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r6 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x8, 0x10000) getdents(r6, &(0x7f00000005c0)=""/215, 0xd7) [ 619.594408][T17690] fuse: Bad value for 'user_id' 14:41:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5429, 0x100000001) 14:41:15 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r2, &(0x7f0000000080)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00', r4}) r6 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r6, &(0x7f0000000080)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r8, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r9 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0xff7d) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f0000006b40)=ANY=[@ANYBLOB="18e3ec00009db77574ffff030200000000000003a5799d86"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r11, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$inet(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="35798768591cb93109ba4ff134cd700e3c8e72cea1463993cb31fe4d82489e67bfe9d5c904cd65f81b3c8c13ef98831d5ee961019dcb821184fd54f9c46f07ec473a8dd5fbd10fd338fff3741d0f914fed878f916a34ae8af4901e30dc0c8c915ac513c526f2ee9cb19f01041a76164bef2edb9acc713a311171a111486d63167c15753b058bec14279d992077f03115a8fe20656c60ea4a7f56078b5911e4c30e275f6599eef8168bf855a1e85ef3", 0xaf}, {&(0x7f0000000380)="8412721dd857c3bab0ef8159da3383a7e76f17e4cbcbf4bea57b5eeabe8ea3f17033decdfabb6998493c972b9f4337b2fec53b5b3a04d2298c31cf01d99a5d0b9f9dae062e8e122e1d5a5237c609dfad0bd8adf682345a4694154e83eb7db94c75a3a07cc5f49c6485315c9d2da1aaacf2c76f7cfbe1cde6be1f08b81c33370764e3459d881bf472a429bc8da32df2cb5f6a7b515fc43ba5cf18604297afa464fb25f39850c705ae021333d6e09a178452d0ab656688c3a87832776d80145d94a2f00d5c83338c9842cb14a84527cdf73d98f61e09b76fef8484ed", 0xdb}, {&(0x7f0000000480)="bf8e50353b6c76816d89be412a655ac4b9cdefd854b04f34976de623c2981176590cd7fab9acc0cd1cbc52e2f51f866371f41f916979f498b1f6fefa325dca11a0ea846fba82f3b3e5ee561aec49e005937bf71fcfadc783f6c658004f61f2fc84f6ec20ade9e76cbc2596bd0b331dc1e64325d3b2a5fe55c66cf885ed3b2c0e2ab75ce8c33fb5c5f3f0ae69d267417d408024c74645deb99ed9b96a6b22604569ce76ff803b5c2824e8a160bd7524274143a561d3821db2139da8b7bea633dddb31d6f1bcdede7bcd426a75b3cdf1cd282ccd5541adca5981559f36e0a3e41d288952f416e5f932bac2f5fb", 0xec}, {&(0x7f0000000580)="40fd335ea7be72559f6f19ac326398c5a3112ff8da63782f8eb4c4e948f4f4a3d2264c634b064b3fae8061fedc50bbb4484b495f5a0c033a44c4b69dc22f4f2a6b3b6cd1feeca748726d1ec06d590b6a76914c8eec03a3aa05095207466896744627162689fba7971a507e0ecd0a1d5f8903b4e06380b9f846dafd51b21133250123e35b860fa6ff736512c77f1bfea7929c6a5698f08afdc10f775c79dfc76fb0b6112774cc8f0aaa83996c0c5490f6e56eb0b4029441014851e81550960a6598f76894b25bba402e51b019706297108133e1e154", 0xd5}], 0x4, &(0x7f00000006c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @broadcast, @local}}}, @ip_retopts={{0x98, 0x0, 0x7, {[@ssrr={0x89, 0x1b, 0x37, [@broadcast, @dev={0xac, 0x14, 0x14, 0x14}, @remote, @empty, @multicast1, @empty]}, @ra={0x94, 0x6, 0x80}, @noop, @end, @lsrr={0x83, 0x7, 0xca, [@local]}, @noop, @ra={0x94, 0x6, 0xfffffff8}, @ssrr={0x89, 0x17, 0x3, [@broadcast, @multicast2, @remote, @broadcast, @rand_addr]}, @lsrr={0x83, 0x13, 0x0, [@loopback, @empty, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}]}, @rr={0x7, 0x2b, 0xf9, [@remote, @broadcast, @multicast2, @rand_addr=0x9, @broadcast, @local, @rand_addr=0x80000000, @local, @broadcast, @broadcast]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @local, @loopback}}}, @ip_tos_u8={{0x11}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x401}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @remote, @remote}}}], 0x140}, 0x20000000) r12 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r12, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r13, @ANYBLOB="9c00"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 619.759382][T17697] fuse: Bad value for 'group_id' [ 619.883691][T17700] fuse: Bad value for 'group_id' 14:41:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000003400c00bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:15 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) write$uinput_user_dev(r0, &(0x7f00000002c0)={'syz1\x00', {0x20, 0x1, 0x0, 0xbef0}, 0x9, [0x7, 0x10000, 0x1400000, 0x7, 0x7fff, 0xaef, 0x9, 0x80000000, 0x48a, 0x9, 0xe2, 0x8, 0x2, 0x2, 0x6, 0x9, 0x5, 0x7, 0x7f, 0xee, 0x6, 0x1, 0x2, 0x672, 0x8, 0x9, 0x0, 0x3f, 0x5, 0xffffffff, 0xe6, 0x0, 0x97, 0x4604, 0x4, 0x6, 0x7ff, 0x10000, 0x8001, 0x9, 0x1, 0x9, 0x6, 0x8001, 0x9, 0xf63a, 0x2, 0x8, 0x3, 0x1, 0xb0, 0x9, 0x1000, 0x2, 0x71b0, 0x5, 0x6201, 0x80, 0x1000, 0xffffffff, 0x0, 0xb346, 0x1, 0x8], [0x7, 0x621c, 0x8, 0x1, 0x100, 0xf4, 0x5, 0x8, 0x7fffffff, 0x5, 0x8, 0x7, 0x2ca6c000, 0x7fff, 0x9f8, 0x2, 0x8001, 0x12d, 0x0, 0x6, 0x0, 0x1, 0x800, 0x1, 0xf41e, 0x6, 0x0, 0xbc47, 0xfffffffe, 0x1, 0x10001, 0x7, 0x1, 0x80, 0x10001, 0x40, 0x5, 0x9, 0x26, 0x8d, 0x1, 0x6, 0x5, 0x10001, 0x7ff, 0x80000001, 0xb0, 0x1, 0x1a, 0x8, 0x7f, 0xbf9, 0x81, 0x5, 0xd35, 0x0, 0x8000, 0x7, 0x80000001, 0x8, 0x8, 0x5, 0x1, 0x2d], [0xffffffff, 0x8, 0x6, 0x20, 0xb2f, 0x8, 0x100, 0x7fff, 0x101, 0x7fffffff, 0x4, 0xbd, 0x400, 0x4, 0x8, 0x7, 0x54, 0x401, 0x3d8d, 0x7, 0x5, 0x0, 0x1, 0x3, 0x401, 0x3, 0x6, 0x800, 0x6, 0x7fff, 0x20, 0x2, 0x1ff, 0x3f, 0x4, 0x3, 0x1, 0x6, 0xffff, 0x1, 0x0, 0x7, 0x20, 0x8, 0x5, 0x6, 0x8, 0x340, 0x1000, 0x10000, 0x1, 0x3, 0x80, 0x7, 0xffff3f16, 0x3, 0x1, 0xffff, 0x6, 0x3f, 0x0, 0x4, 0x7, 0x7ff], [0x81, 0x4, 0x8, 0x200, 0x3, 0x401, 0x8, 0x80000001, 0x1ff, 0x809, 0xff, 0x800, 0xfffffc01, 0x6, 0x80000001, 0x0, 0x0, 0x5, 0x800, 0xffff2724, 0x0, 0x0, 0xfffffffb, 0x1, 0x0, 0x8, 0xffffffff, 0x100, 0x3, 0x2, 0x401, 0x1, 0x4, 0x5, 0x0, 0x4, 0x5, 0x100, 0xd0, 0x6, 0x1, 0x1ff, 0x3, 0x574b0f08, 0x7, 0x0, 0x8, 0x7, 0x7, 0x3, 0x8, 0x9, 0xac, 0x7fff, 0x9, 0x3, 0x8, 0x6, 0x87b, 0xffff6635, 0x6, 0x7fffffff, 0x1000, 0x1000]}, 0x45c) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xffffffffffffff00) dup2(r3, r4) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080), 0x1c) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000040)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() setsockopt$inet6_buf(r2, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r5, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x80000000002c00) 14:41:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5437, 0x100000001) 14:41:16 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='.\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030343030303e211d54de534714abc9150a6c213603c945064acf", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 620.061840][T17690] fuse: Bad value for 'user_id' 14:41:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5441, 0x100000001) 14:41:16 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x702080, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) [ 620.165412][T17715] fuse: Bad value for 'rootmode' 14:41:16 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x934, 0x0) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000340)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0x6, &(0x7f0000005580)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, &(0x7f0000005640)=0xb0) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000002c0)={r7, 0x3c7e}, &(0x7f0000000300)=0x8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2e726f6f746d6f64653d30303030308006000000000000303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r8 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x6, 0xc5a1266861a9896c) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r8, 0x54a3) [ 620.216180][T17715] fuse: Bad value for 'rootmode' 14:41:16 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x934, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="44482c9bb60ab2255fd56a940a52d362e210372c122d847b579acb6054c453c1603d49e5ca1cb22a6a", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000080000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRES16, @ANYRESOCT=r1]) umount2(&(0x7f0000000240)='./file0\x00', 0x5) 14:41:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5450, 0x100000001) [ 620.329105][T17729] fuse: Bad value for 'fd' [ 620.394936][T17734] fuse: Unknown parameter 'DH' 14:41:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5451, 0x100000001) [ 620.416536][T17734] fuse: Unknown parameter 'DH' 14:41:16 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x934, 0x0) r3 = dup3(r2, r1, 0x1c1947ba7fc71160) write$FUSE_BMAP(r3, &(0x7f00000001c0)={0x18, 0x0, 0x1, {0x8}}, 0x18) ioctl$BLKPG(r1, 0x934, 0x0) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r4, 0x934, 0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r5, 0x934, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r6, 0x934, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0/../file0\x00', &(0x7f0000000040)='fuse\x00', 0x80000, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYPTR=&(0x7f0000000380)=ANY=[], @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000780)={0xd0, &(0x7f0000000180)=""/208}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) connect$inet6(r1, &(0x7f0000000080), 0xffffffffffffff00) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000800)={0x3}, 0x1) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r5 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000140)='ip6tnl0\x00') ioctl$IOC_PR_PREEMPT(r5, 0x401870cb, &(0x7f00000007c0)={0x6, 0x6, 0x2, 0x6}) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x458, 0x258, 0x258, 0x370, 0x370, 0x370, 0x370, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x6, 0x5c80}}}, {{@arp={@broadcast, @loopback, 0xffffff00, 0x0, @empty, {[0xff, 0x0, 0x0, 0x7f, 0xff, 0xa838c719a6907872]}, @mac=@random="b7e66fff67a5", {[0x0, 0xff, 0x0, 0xff]}, 0x3, 0x5, 0x100, 0x0, 0x3, 0x8, 'hwsim0\x00', 'syzkaller1\x00', {0xff}, {}, 0x0, 0x65}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@dev={[], 0x27}, @local, @local, 0x4, 0x1}}}, {{@arp={@empty, @local, 0xffffffff, 0x0, @empty, {[0xff, 0xcd4c193a80d0d8ec, 0xff, 0x80, 0xff]}, @mac=@random="ae6debbf2fb5", {[0x0, 0xff, 0x0, 0xff, 0x0, 0x3bb7d6932b443ba0]}, 0xffff, 0x0, 0x1, 0x5, 0x0, 0x100, 'teql0\x00', 'ip6_vti0\x00', {0xff}, {}, 0x0, 0x690}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) [ 620.787940][T17729] fuse: Bad value for 'fd' 14:41:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5452, 0x100000001) 14:41:16 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syZ', 0x2}, &(0x7f0000000080)='c', 0x1, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffc, r1, 0x0) keyctl$instantiate(0xc, r0, &(0x7f0000000300)=@encrypted_update={'update ', 'default', 0x20, 'user:', 'fuse\x00'}, 0x1a, r1) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r3, 0x934, 0x0) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r4, 0x934, 0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r5, 0x934, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[]) r6 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x1, 0x400000) epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r3, &(0x7f0000000280)={0x10000010}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:16 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x934, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000002c0)={r2, 0x0, 0x8, 0x3, 0x1ff}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f00000001c0)) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:16 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r3, 0x934, 0x0) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000240)={0x401, 0x7, 0x1, 0x80000000, 0x2, [{0x200, 0xd346, 0x7ff, 0x0, 0x0, 0x4}, {0x1, 0x6, 0x8, 0x0, 0x0, 0x400}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:41:17 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x934, 0x0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:17 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x545d, 0x100000001) 14:41:17 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="a347ee55bb8dfa45280b0cac917f878000"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:41:17 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5460, 0x100000001) 14:41:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x24002) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000003400e00bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:18 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x3, 0x0, {0xb}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r2, 0x1, 0x70bd2a, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x800) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:41:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5522, 0x100000001) 14:41:18 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0x40, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e22, @multicast1}]}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000340)={r2, 0x200, 0x133}, &(0x7f0000000380)=0x10) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:18 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2cfcd0cba88c33cdf163", @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) inotify_init1(0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0xab8}, @sack_perm], 0x1) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x6364, 0x100000001) [ 622.177826][T18031] fuse: Unknown parameter 'üÐ˨Œ3Íñc00000000000000000003' 14:41:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x87) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3c}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x0, @in=@loopback}}, 0xe8) connect$inet6(r2, &(0x7f0000000480)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:18 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000740)='/dev/hwrng\x00', 0x58776551e0b7315b, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) connect$l2tp(r0, &(0x7f0000000780)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x4, 0x3, 0x2, 0x3, {0xa, 0x4e21, 0x2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}, 0x7}}}, 0x32) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x400000, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000002c0)=0x68) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303e303030303030303035303030302c7573d1565f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:18 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x8912, 0x100000001) 14:41:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0x7, 0x47, 0x2}, 0x7) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) socket$kcm(0x29, 0x2, 0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r5, 0x934, 0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r6, r7) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000240)=ANY=[]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r8 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000500)={[0x4, 0x754a, 0x0, 0x1, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x2], 0x3000}) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) [ 622.508251][T18068] fuse: Bad value for 'rootmode' [ 622.976787][T18068] fuse: Bad value for 'rootmode' 14:41:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:19 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/mixer\x00', 0x492e23, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) fanotify_mark(r1, 0xa4, 0x12, r2, &(0x7f0000000ac0)='./file0\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000980)=0xe8) syz_mount_image$exfat(&(0x7f00000001c0)='exfat\x00', &(0x7f00000002c0)='./file0/../file0\x00', 0x7ff, 0x7, &(0x7f00000007c0)=[{&(0x7f0000000300)="10711a833655f1cc4ff3825bcf76f5f2927d4f092d0cdc258457223f1e0b86a409e01d83d1786c846818138cfbaed19084b02b7fd395f23976e4b839f2dd9d0f99f2e7214c4d62fa0918e1fa1bb2daa7a54db29393adc28cc34ae005e7ce243d6fed504cd85b9f02e9a18df8beac5173da6fcc44d314ca008f400df0281ad1a68350d9f0e9172c632264b3f6bf35857cc5bf620e1f5cbc401b4144818595dd0ac4214ab69d647b551aa762aff9637d30d76664c75b3c30ca3e042ea7cd5fed23d31be7c0c509f591360418a410", 0xcd, 0xfff}, {&(0x7f0000000400)="8ee51746139a176a9bad3cb5cbd711f54da6bfa4d24a6612bdd340fc7d65638af22b78e34a6cbbb72919693ea2d9e556ac76e3d40f115dfa60d952f1f6270991ad4b558ab348ea8d91e2f99fd6cfc978350068f182158f42f93fe3e7cb37e67a91860edbf57ab88f0efb3ba9909fbb2bf04cfbaff17bbe83e4e35998236f7e3133858c259f0481558d660033884041bfa72c970e3dc688a791fa5dce470fde93a84f47b302b068", 0xa7, 0x33}, {&(0x7f00000004c0)="069bf6bed820c16a3c3b6bdbbeb34f3d6bc7687e4942cfcc57552513cd5af35032a3356396afa1f8e9440d975c031fc2c2d6bc95597faec42c055986766ca604e5c9bc4e16dffafd3a01921649d5b7ef722a7e3c23bd2d6be8b04737a84b044618e64ded5aee2d767777ce3504f5fc88f0b67bf9b445cb4bb12671dec4c0d7831dfbc1d7331ceac1838f9835559ae863dcbb5a19e9fa1559cb2c81de25c3186d5401851bb824ca2ccebac35bca4ff0589a4060006ab93c31", 0xb8, 0x4}, {&(0x7f0000000580)="d29000cafab5618c1e367a69350ebd8e80f2ed103386e9fb1950f454731b5ac470fe83790e816e7a774720e44f3cb64d1de42b84b94d5cd20e4b9adb7a5219884b1811685a40fe5e3ac4825d2885ef9deef17d7faef7cafe5f79d52e52fd0a00b13775df4a7865f5aa74fca3d8a66008b5dcf5ed15687d7ec63559325de3355fbec5ab774a8e182bff38067426ca4a807105750ac93f3efacba3be516c0732ece353958f3132e2f2b3e8ae70a945c8a7c0863327926edf840a813c9819eca25978dd0b5edda8ada9487c888c", 0xcc, 0x7}, {&(0x7f0000000680)="ffef7e017bd8e557ab80f51aa4ddf412bf73bdf948af4fb1370bfd846aa7526b4899b6d08f66d90a708f33db443efe5ae4324bd0cbfa052d417b9b01a0bffe09e414667019b537a0b80b0ef3133bf6d6c22045e3e35cf2a3e64b9b", 0x5b, 0x100000001}, {&(0x7f0000000700)="fc0b5941bfba1f062f821e4d1c06cedd9ecb4e2e82a6b2389319d127ed5dd4f88d6d35002bedc7411a8e3bec2c712ab64de242d36e51c27c3c3437c49a7f4ef9ba831174302b18e820afe274032bdcf0240fc09328796dc2c9070e0d5e79fbf64c29ab350b902fc602870c", 0x6b, 0x6}, {&(0x7f0000000780)="070f9a101f566f58aabc13d87402af49090ec13e043818da63bb96be4110d86d4f8ed3f51c0c651c4e9aa0b85d5672d54dd60e03424c25", 0x37, 0x3}], 0x100000, &(0x7f0000000b00)=ANY=[@ANYBLOB="756d61736b3d30303030303030303030303030303030303030303034302c636f6465706167653d757466382c6e616d65636173653d312c757466382c636f646570616765adc170313235312c6d6561737572652c736d61ffca405c2246c545dbfc636b6673666c6f6f723d2c7569643c", @ANYRESDEC=r4, @ANYBLOB=',smackfsfloor=fuse\x00,\x00']) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r5}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x8914, 0x100000001) 14:41:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x8001, 0x2400) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000140)={0x0, 0xfffffffffffffd0e, 0xfa00, {0x3, 0x0, 0x222, 0x5}}, 0x20) dup2(r2, r3) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:19 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="2c0010d5633fdcd296c29fb3e54d7731ae862386cfeb63685fdff2e8ae7f3d95"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:19 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x80000, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x8933, 0x100000001) 14:41:19 executing program 3: syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x40800) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:41:19 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x40000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)) accept$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @local}, &(0x7f0000000300)=0x10) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x8953, 0x100000001) 14:41:19 executing program 1: mkdir(&(0x7f00000002c0)='./file0/../file0\x00', 0x184) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) fdatasync(0xffffffffffffffff) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000003401000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x89f1, 0x100000001) 14:41:20 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:20 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='up_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:20 executing program 4: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) ptrace$cont(0x18, r3, 0x0, 0xfffffffffffffffe) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) getpgid(r1) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3c) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r5, 0x0, 0x0) r6 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r9 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/p\xb3\xa6C#D#c\x00', 0x3, 0xf62cab6dffa53a2d) bind$netrom(r9, &(0x7f0000000140)={{0x3, @default}, [@bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @bcast]}, 0x48) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r8, r10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r8, 0x6, 0x14, 0x0, 0x0) r11 = gettid() ptrace$setopts(0x4206, r11, 0x0, 0x0) tkill(r11, 0x3c) ptrace$cont(0x18, r11, 0x0, 0x0) ptrace$setregs(0xd, r11, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r11, 0x0, 0x0) ptrace$setopts(0x4206, r11, 0x4, 0x25) connect$inet6(r7, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r7, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r12 = gettid() setsockopt$inet6_buf(r7, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r12, 0x0, 0x0) fcntl$setstatus(r7, 0x4, 0x80000000002c00) 14:41:20 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) read$usbmon(0xffffffffffffffff, &(0x7f0000000240)=""/66, 0x42) [ 624.218224][T18150] fuse: Bad value for 'user_id' [ 624.254916][T18150] fuse: Bad value for 'user_id' 14:41:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xae01, 0x100000001) 14:41:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp], 0x1) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:20 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r0, r1) sendto$ax25(r0, &(0x7f00000002c0)="ccfdc4aba7606d1cb939f32d83df2ec0f1fb48b60a40d3d250a20dce426092ef40df1f15e6038b42e63be50f0cfccdcb50bd76e69c278f28790f20ec41f8026c2114fcb35de21178b07790ba68", 0x4d, 0x800, &(0x7f0000000340)={{0x3, @null, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x5cbe4450de9c5b7f}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}]}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:20 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r0, @ANYBLOB='\x00\x00']) 14:41:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xae80, 0x100000001) 14:41:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000180)=0x3) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) r4 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) flock(r4, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 624.496442][T18203] fuse: Bad value for 'fd' [ 624.529369][T18234] fuse: Bad value for 'rootmode' [ 624.534869][T18244] fuse: Bad value for 'fd' [ 624.988418][T18234] fuse: Bad value for 'rootmode' 14:41:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000004180)='/\xb5\x04\x12\x028\xa5\xa1F', 0x20001, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) getpeername$packet(0xffffffffffffffff, &(0x7f0000007d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007dc0)=0x14) sendmmsg(r0, &(0x7f000000a440)=[{{&(0x7f0000000140)=@un=@abs={0x0, 0x0, 0x4e24}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="1825dc35cc93e74f0d381188b7c5fe076afb5731f5537d6b795552b3a470b2a25d377f869dfef00399dadedf0ee689e85ceb19077f26bb2e72fd8f4995be3c53101ad79665936ba337d9beed8d75f429e9b997c92aa8ad42de2e9ea66abe8988c9b62e09cef3bf0e77ece759b1a284", 0x6f}], 0x1, &(0x7f00000002c0)=[{0xd8, 0x10d, 0x3ff, "f77ae3c83bef743305a2c6642763d7ffdce79e91fe67083cca69cf92cd7c600cbf3574e3db7e5627d551be3e67193d64ec435adc935defb9dbd1d3e89dc5140a2d18258289b2845658a55021c0b8109a72790193c1f5cec700f4b8227dc427caed44b788fd4bb83576f0fb5d2eeb5c4230ddbd92f0ef8015180238973f6b36710ef4380a91d84a91b3f9132c2563cb769340e4a997cfe4aa581111c603cb5a09250ec782fa7cc5d656975070aac1ec533c076bdf2d3c08ea71eed4360bfe5b3a64085e"}, {0x28, 0x111, 0x3, "7dcd0fd99416045db8083c665cea4f1c79afe935"}], 0x100}}, {{&(0x7f00000003c0)=@generic={0x4, "ef2b846e195169359678a39a98ba032b10d1ab41650a9640ad3a02ae81d68568cbdd74d0db0ff142ae6a704c7acdaa7d8a39ab4a6c5d0d104f76e8dac82626ce66af44bf547d34a34c345c6225d9e2e6bd5ca8a41eaf07b32d4b14a1e8fc2205a043ece07492be7d1fd9084ad77dd3715f4e7c38768a854a987a26746c3e"}, 0x80, &(0x7f0000002780)=[{&(0x7f0000000440)="befba617f63b5ba27e00b512c444dc22c3a5aa9870854fed31333722e6c981d20074f81198722bdf74c5802975b3eae7686247ae1834e60a8a86f7a18b6731e8c728cfee928a5c93738dfea43ed3b363d20735a030c2f3f9b1fdc030b3dbd23573653c63805b49a1eaff96eca00b3a5902db6c7b661296c991f42b5bf2ba17d0e0df8947a71f8629b6fa0d16a7cc27ab0a0b17426cce705783a87f43eb87fcebb3c18cc5c4b3abca4b444012d878e5b40b366f7a957988295ddaf0c1d36644d17574150a50ee7e158e4586b0af971dde4d8e473c421b381bb614c75ecd8de8eb3b03d6bbb219448ecfc0abf39de8", 0xee}, {&(0x7f0000000540)="54a898614484016c22d75abb10f04ce441b254ef192b47a3d579fd006ba23c6d15227c69b47ac2bcbb65a1561e216f80b25e856a436dedb2453d653b0c4b0a8484cb50b7e893eb98845ff3a27646acdd362947a3d15664ceb250e4e643f02f347f5d46de8ee78a7fcfd02f82fb66a353531c4da368593264e86ecf25ebe6640dbef7f05d93886e05b6762a2c85b5d128e786c58d78d99a95ecfd5169b93c124da6b5dfdef78f30eaa34d4a1e13ac54e813f5883141057b55dfe2e34c4a54dab42edf7132e27243f2977533275546f48e9f4c73d84d82c48fbac53f", 0xdb}, {&(0x7f0000000640)}, {&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000001680)="3c63181970d310b270110a234f0fd773cb75418b40fd45ff9ed3f152b5f214462dc2f08980205092bcc8bd961fa6cb3da18b0f", 0x33}, {&(0x7f00000016c0)="4b3f647e2f2f505621c1666e0032cf01765b56a86a6dacced01146ed525fe08cd2f243f93f88bc1324d3053e6c63369734feaf57510fa1cddda0442d3cffc3ad46a2495a510aa1708afde3c9e19dc43eb525246833113e838c0cad4f8498e0db0480b5fd427d76a4b2741065ed4229", 0x6f}, {&(0x7f0000001740)="bc7b290c3b43b4b718f6a39af389c6", 0xf}, {&(0x7f0000001780)="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", 0x1000}], 0x8, &(0x7f0000002800)=[{0x78, 0x10a, 0x2, "b9888600c53a0cbf01b7b22a7bcd34d3b61f9e806e6b3b4d0ae6cd39c17aba7c4f9f27ef3bf9b326a10f0d937f9023c76a6f842b626ee35b7645fb57b385bfe8a5a2747fd5fcd28a3a0921d0cb6dec6650cece309c3f175ffd26aa49a7f1e66a66af"}, {0x38, 0x11d, 0x0, "845efe60017f50a3c50251ddc366c752a4ac9b567a5d469747f62a48c37ea1fe45780cea74"}, {0x80, 0x3a, 0x7, "bcbef45c0b6c8f125a641b307bd4a6172fca361ee99acecf382a01079e04920e927d2f08f605a318069c823ef39fab75e197d134ea7f69a4bcf4f7fe795aa0f7eaf6971ee9189cc3365b977ec300fc29ae122f0aa6f78a6bab3ac15c233f29476e640bdb417b57e185c66a68a01f"}], 0x130}}, {{&(0x7f0000002940)=@generic={0x561f72bd443a0623, "19b67a894cf02e99f1f5277a782ae9d50e7939dabaa17511ec4b5fdef9745b4ceae10abce422853ec50cccec64ef5053bd994370a0633d350166bec95f86a539840ef1931b6fad05f049020f10961d6a0167342c1f851ee038632d8064f08fd8dee86c297f32ded1c8131666d3efb5747aae9f5dd01c932f49d335a05eb9"}, 0x80, &(0x7f0000002b40)=[{&(0x7f00000029c0)="8d3989cd9559bd8e41b06c11cce1bf6808dc2f9c2597115d1e741e4657052e956419de2c03bedac2e51974a6e5eaa9da593685c5e2e3fa95e688f65b216cd694629196ab0ccfad7798f674e992dfdcb67694b455b0860e0af1b505a8034f943e629ee623053be152b49cabf942e7dfea33fe605b353c01a458a589d545ac4957fad53d406ac81891bc30629ed544ce03b4baa5affe914ff07a210bf8380dcdeb395738ed9a94641649701b713e37f7cd9762bdaa1d9dc2c42ea5ed765119f8a60272571668b0cf9a", 0xc8}, {&(0x7f0000002ac0)="2425a7f04a3e9d023de6c76a037f5fb0be0ca5fa1b5bce2e92b15fc986f4ead375ba3a4dcbc89fc52d35844ed3ff0b7563354a76802a97da3e64fbb6bf9cf02d8877f4a0e1278a6034173c4ba4f8a85f8bc22138807ea4c58817a6ec00ccaccfa70854f8e639953e628b011edc4236bc39a937c86d41218829717e3a74f22c", 0x7f}], 0x2, &(0x7f0000002b80)=[{0x68, 0x117, 0x10000, "bc0ce832f780722de55172490c927b9a03106ac334ca68e479ceb15923257c2183d5d6fa4986e47c4191dd8a3e32064871ab2558839fe80270b7d4119fb397fb61ec5695d4bd29a4aba49c461c7a688d3e57668fb6d0"}, {0x20, 0x231, 0x9, "2bb4e1b9b91854f301f254a8fc8c0608"}, {0xb0, 0x112, 0x0, "2edceee57caa4885cc85ded5d5fc433f7ffdbfa780694520609c4509afea2503f242503b37ef5bc821cf8de7218dd50f40caba7f1f2296670d85e533fd97386625603f5bb48fc5c98c2a55649f04c3a5c17bd46c65bd3ca886f1c122666b73102b9e1884af31eb31b457d7253e5eb5b87245b3dbd3ac73789e1c1442d39dd12535e1a7fbd2c3ced8c9f15f884e5c81760a5a6ab0efb84a686ff1c9"}], 0x138}}, {{&(0x7f0000002cc0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @multicast1}, 0x2, 0x0, 0x4, 0x1}}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000002d40)="8b33be5801542354276c1d93e65bb523f5326cce860a87fef6eff84cae5e3d12858e35583a065eb79e36e2a4e671612a10b4ee91336cbb6d39b9bc68a683c10ce0d7353cdec92c7ecd690687a280929971182c0eeaddd4e41308189cda8457586adc6b6c9443a1b5067fe12565ade21a75", 0x71}, {&(0x7f0000002dc0)="a33dc00f654bff9e46bb0efed024d0ffd41e2d9064bfba654dd26f8745b033cd9775058a01c9563833f6e3d3bc89c12b99a9947a71178f2494217b2ad801bd189d1ab429054fcb0034eb6c3ffe3bcd34d1e86281859fa3324e91fa0271de2d13e5991df65b365dbf6053bd68d803c5c12630d38d0f284052cf", 0x79}, {&(0x7f0000002e40)="116601a32b78f2fcfac645af7c1e1947c92c050a753fdd5ee16e099a587d76b5e3b8180fcb4a61b5cfc2702efdaa90808cd9ac3b7fdf2eac7a1773ce22a9a8c3f602cfc735c54491bee6a78eca3ef501121324a565450c6e04341ba9be3c587e358482d9d824e6a7e75aa75eed31376367597b315908810f40b4be34f20d1fb28f61bb3c8f4a3d7ff3", 0x89}, {&(0x7f0000002f00)="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", 0x1000}], 0x4, &(0x7f0000003f40)=[{0x98, 0x117, 0x200, "c3d3fa5d102bab14f5973d3f00bc921b394949f7c5f4d567e305123d91f21a60db8994bd68dacb02f63a1bf39518345d86a3b80125bf36762e2895e5ab9d7c0526f187609a575da36ebd5f4ffe16158113c336d508af6a7a35b9bf33ed29bc94cd55366512f9ebc06216ae4be500deac5260dc571c9ed4d76993d4ad3f487c244abf146903fc"}, {0xe8, 0x10d, 0x0, "2a8aabd7555ffa69c19f602fa6159958a7a9893484809236bf4e7cb945f6143c324dacb595ceb9b7ec1bb218e935e79c3fd4b5ae63d3d4d67725c6dbc1426749c70a539ddf06ec011e08003ee45c67c9d14fb3a796537daf1dae21084af50b2caa86c955f9075f0123af86bb68145c18676ddd5c7eafa083e1435b2a4337a0d11885db587fbd5bb05c9084bc1923dcb2dcd3783ce7c1f282b267e53df60a7d34ddedc4a6a51fca642b439fe6ec84fbb42f3794184ab4db58c8a1cfc3769384d77fb56b93d64ae2b377337f608a37cd825312824124fa0540"}, {0x88, 0x0, 0x5, "5e62668591aacf0d1d64fa877e00a3f3e4086e24bfdc510a3a247c257536acd3f67f14f4b4fac3cadb390c7651271e03041aa775a54f70977011825bec27e73ae7387121a2ac38c367bb7f705528acd865a2f15b085ae73cc6943ff84fa33e47bbadeff9fb9007471b6ca19eb19dc45685"}, {0x38, 0x200, 0x0, "a07c2e1f0d6dc9240040f487a2e08cc3376ed1beeae62aae40a5d927e0079aa393d7a28221f0da"}], 0x240}}, {{&(0x7f0000007e00)=@ll={0x11, 0x9, r3, 0x1, 0x15, 0x6, @random="2b9b27343490"}, 0x80, &(0x7f0000008180)=[{&(0x7f0000007e80)="1ada4f22f865eb54d80cca11efda0930cb5e3a3fefb97c1e9ff9315ce204c3e70f4dbb", 0x23}, {&(0x7f0000007ec0)="8888308241c53372edbbea05dcbc1c9a6253b1bfa94626f9b76bd4c8341e76db28702edac0cb0364ae2b89b635f1539405b1d500aeb1432c17a0b985ea9bde12da70ed04a078a1d34561588f0e0f7c476e59413b7557f7680045130c2df7c4e0e43ca096c08d1f43edd9a7c7772403eb2c531934867cbfcbbef5b1357e08600a5b1a341dc9fef4c0616e67990d15b7ed7fcde346622b840a5d9d2100227c0032cd87d3923a1932ba", 0xa8}, {&(0x7f0000007f80)}, {&(0x7f0000004780)="cf2fda43d9f009277c14502bf66d940b6d0a14ede2d5e60796b2cb83d2ed3778e3143c39753fbea3fd638fd4aa667945d0ab5193c70adaba250f563684a4111da44c776d95fd07cf51961400cce92a86de972bdb80067ec307b211e04c09d43a5ec19b6c919ea600a2857d28df662b51f2c96d58d3c5b35e40eac493a4e03f864595de2c8bd54f651b74fc1f3d0c1122193bcfecea4721505e7bf07f5b39f540c38beb3f13de60a9d288100bf598875eb2bb8f2a06313471e7feaf1bb2b4aade948937699c7230639deb9dfefaffc264802a8ba9813941f445e4ccfeea39d85f942442caebf307b028a30107478f7914af5b80576f6667530604", 0xfa}, {&(0x7f00000080c0)="b07b3b56e935844174b05fff0b234be92ec5bdd76ea17877d801b73750bd3cb4f2a1f4e0bee838b082c883b97e5ffd7d8a8cbd8bd29b05ec0041e7bd3f594cbe8795938d7c25640f868c38926fc4c9b6a1c064256fe980b5cbf769b9974f8c8a5b2256ad07d35aa2bc38064beb9d1294c938ba3f021d9077594341eea76c6c0ea05e57ed1afda1e8", 0x88}], 0x5, &(0x7f0000008200)=[{0x48, 0x108, 0xe18, "55e73f4024a5c77d774b01dc95596ee61ba404542163ffcc179712e84c131bc155a4931cc043fa10d255a4f8140e40eab0775b6b9f6984e3"}], 0x48}}, {{&(0x7f0000008280)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x2, 0x4, 0x1, {0xa, 0x4e20, 0x3, @rand_addr="569ef65c1eb4c192e5bd5fbc064a56b3", 0x9}}}, 0x80, &(0x7f0000008580)=[{&(0x7f0000008300)="01d0", 0x2}, {&(0x7f0000008340)="ca136053c8a804c2bbacfe54c182f5456f7233fa02fe3cd81d567980bd441aedc7978a9f43aa0a9f7f4b4f2cc6f21adc7a4de10495c65a03f8f7499fbef3fb3e3555599b9094ffb3c271bef2747d0ac245f91e678f60c2f4b62f88c3ceb9166f70ffcb421bce7c3c92d035fd41a47e7c17d388e62f023eaec5acc3655c5bd82e92827e12a784629e7fb53f2539d5552571b1a8fe29980771d97565dfabb66502af09a151f5d384b9a5ba6855471899e823603c23486d656ce2059e0fb7462f320e65226d18b699e9853c94c259a9c46b5433c6520a51c873c6a7cb7f490012dce0bf791598", 0xe5}, {&(0x7f0000008440)="a80d2f343e319379fbf11db450b1eb49bbf2c757a55e6b21fc0a5e943cc852a5c1474b669ebb40ebdfcad6c5d4f334ad44f4eef299a54ef42fa84a928f264007c4105e2aa96045213456109f4f9f2b620fe6b3a332ca35c2642bc81c5b7efbde456ca8a89fca174728641b1673fe35782a9a73752ac53b4677389b12484e49fba538f80c7d4d1814ecfa8c88cdee6a812893111cbb80fecb3b9f681b73ab27a3bd4b38fcf8cb1fa2e53343e337166d", 0xaf}, {&(0x7f0000008500)="ada9ded125e1afcdd3feab316c621396ad6b2a9654779678415b91f8f11430fffeaa44ee8505f7c4bf9310636b07558d3ce991af540d9f02685a584a9f5022db23d3037d4e8ce9cc7fc7", 0x4a}], 0x4, &(0x7f00000085c0)=[{0xb8, 0x84, 0x7, "f7568bfee4557971fdb2c250fe748e8acd47c2ac65c02b336c6a23c245c8ef04e3dd7f4ef9c1b9e91e85802eead2679f0fbbedbe5bd0955773df7213f72ad477047d0004febb6fd6507b07ad17669fb88bf407fb6e54edf4f4a4135f38158b761ad3073896a3d1fa476d784b8cafe25a89b8e4bf77c1f02528ef34f8200baab8aa339d11852767511eb9b550973adfab779ad033d78eeacd78bfd70fd65c79181ca4fde2ceae1f9a"}, {0xe0, 0x0, 0x6, "d47837ca2f54133d2226e8946bdace34635f6d2622919b5a7c244105c47761ba5d2a0d3483e465fd3f4ec36b9dd87faaee954f1131b419f2984469dee6901e140fdebae91f0662005da958a2c03d91caa860361183acbfc1f686396e121b49494c5f829dfb33d953f9dbe9e798efc6f08f2f12d2a231d17b2269f177d6552750f635e7e247f57de1df29f356279b6661c63e87ce963c23f3297325d30a93f11a154261ad647d0584ba3841916191d63f45b8e7b710e0bc4b4971ca5a1196d4ae10cf8b3c651945ae0c338b778eac"}, {0x28, 0x113, 0x4000000, "3b53023cc3c3528cec77af48621596b96f36bc16"}, {0xb8, 0x118, 0x2, "4498c1a4e038ff7cdeadf48b42b08ac1073a33ba145541d3adaff4cac78968e7622f0ba476e17db2a968cb5b89a7d7c93c55f2be03ea874c948f5d16f682b8c04d8ea63d409b1e9abdf2ce7ded16eb64640cc31ad4024c254b9d3d6ab30bdf2ecf39528d109076dacc98241a5a2aeb8ddab1048b5da5da445096cdfa318398e861efde5caf5a01f29b1a27306dbb0cd1beff17d9bd81a940d43804221851e45c787f"}, {0x108, 0x111, 0x101, "c795d6377b02ea7c18fa98db1e622fc8d5b8adcf1b2fd898ebaa7912eb7c4adf0e8e3aba5ef57353fd09914425849fc5dcf606f3179e681e0de7a7887d79c5862f80041c8c3fd10341c27fc2633cf3b7f67a7c3571fa2bc31257c34b2e9274947a2ab7cf0fdb78e871961fafa73cf9bbfb1670e995bc72f815b9949ed41db9fc8188f20de7b5d713f302d910baea153ff86f031c006958d31d5fda7f5dd6d6cd918e1dc6a6c2e13e7dec49dc8dd568e506df6fb90403e8a87a83f07bf250a8d632c8c23a1420c274efe400ef2ac074d64e2c939e296645bacfe879d47b33f771d25b53fec85d079df05003ccce4123060076b0"}, {0x50, 0x107, 0xb9820d82, "ff38bcd1bec38ec7786d6be73a7f7a0103e953c54b36dc9a97940ff8b628a4bf9f45bfe22067c8fe7c1c43bdf86c49ff06100f85466a88e5ebd839a3"}, {0x50, 0x80fdcd4d3834ee27, 0x20, "c5a06ceff955530eb07d5ae646a26fe44069c1adef380bdec64739707bf90fd42bebdebe064584c865e38988b7fcd285c9ecea06ee878eff96c60bffcf08"}, {0x90, 0x1ad, 0xc4, "99784fdef1c86fd526de6a87fbe1ba5b993d68d086f3a60d19a27318582a7b2832e445bad910bd94f7cdde8a023f26994dcc4bb4674b9f8b81855d2d51cd076478d6eb72b5af311feaf93b09f82638ad43d24abc570e6a658373be65383af2ab01675ef37203a4c97651c6cd61359e5a5f9c87c511260d54b30874"}, {0x90, 0x116, 0x4, "4e1105af7ea26e3d215a6318a44cb179053e07ff1deacc07efab5d1ef0fb52f44adb674f8c22a9ab90954654dfb74e943484cf8ccf119afa72e1df7e8e466f3296669c08270d9fdf251bf50cfb5076caec4d4000e3bed93786914940f80969b2c6fdf57aa59dfee519e777915c12496e68c2dae5286e31ee335c5608"}, {0x90, 0x107, 0x80000000, "929a07c7c70ac4736cf226a536b9e36f6c77da0b4079618b810a17f7af5ee6116de410c60702ffb65b99b0a1df83b69df54200aa07b660f360baa3a782eeb5016e2ce1e3d5adc140463e4fe590bb1c4775128189d1a8b2a15dedd91e8876a70eb3bde226f3b807c9a4cb66048a72884251199e4a8a5dfb9c6053a0f2dd6fba"}], 0x5d0}}, {{&(0x7f0000008bc0)=@l2={0x1f, 0x8, {0x0, 0x8, 0x3, 0x0, 0x7f, 0x80}, 0x7a6, 0x20}, 0x80, &(0x7f0000009e80)=[{&(0x7f0000008c40)="3688b9e0955dd0d60c78738d87fc", 0xe}, {&(0x7f0000008c80)="06e2c70a2d07a823981150b849e213ec53510f690443c06c7d227a9c6fe7a2964a230a229e2d42ae9db556fd7f3867bd16e995a5c81834d6cc3b485cc32a1161feaf8ae2a7eefb8ca9dbf3b2e9827ab277ef0b19436b", 0x56}, {&(0x7f0000008d00)="60d42d64687a0898178e766ae5e076c3aa4aef3b428d2435de02c97551743bd2c53272e9d848eee316f93e6ef844eac55933b49e89af1c652d5018b6fe02d1acbef1a12ea6476b077c92", 0x4a}, {&(0x7f0000008d80)="89dbf0c66cae92178738c334e21474c868eb666a953ec5463bebd5254f0ac087729e87cbec1f4d36e46d945d3f80d4d044dab5307aa33e7e21dfff626af58b128b11543db150ca216bb9fd2c66dabf160b95b8aa3a86d818db63e9902d9000834b033dde02ce034ba9db05848435474f610b3c3d5d01324f201aec713cdc70f4ef1e8a6e1ecc90bac30ae6d745b4ce2fc288027c6da491b4bd374ae5fb2f9f3af914545b81b88f5a90ad6925bc2ac2cd0af099a52c697dd5d0bbb25aaee451cafd71a9436a3de02b6570833db58d5b83cc58", 0xd2}, {&(0x7f0000008e80)="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", 0x1000}], 0x5, &(0x7f00000041c0)=[{0xb0, 0x109, 0xfff, "872d5fe01f517aa274ac9f96d63828e0067a42aa1144440ea5e1ac743e6ca4fbc5f68109445b718775fa3d45069ba1b47910543d19e42c27065d19cfe7df2c22c2523d43e8b69a90b1806a26504b78d143de9a866d25502355425763f5358142c60947754afeb6c7db9757fa202c13fa625ba7fd622faaa25320461498a328e627c9be9d6ee8a9614492821b2bedf30e2956e34170b2cfcc1b0fe1d683"}, {0x20, 0x10e, 0x31, "e1b5e5f793e1b4cc8461d396df1820"}, {0x90, 0xff, 0x7, "a446685eae95950ae0ee15a07f873e375fcd1083768ea358cfcd0ce33a350b700593581ddc9d84e8df8601eb5aa7c9204bd71a85991c1d93cb53ba984acd202a81a4843738fc4b6899af78697838680d917f3d119f5900e5885c1f0e9eba1c51057b9ae55959cab439233b2da45638f69c0bcfb5ebaf2db7e85f28d9"}, {0xd8, 0x3a, 0xffffffff, "9e9b8d98bd5fea3ca70c84e74f6e0403bff9a7a91d0a77eff9078d0c4be6f902706ca91c5a10ced92f19063b42b55ab56802defaeed131ca904d2627cfc7b422509f646362d5660532c8cd5a0e7082de00143cad28ebaf4eb73d5d49e5d17d9e56dae979907e7607aa1ca02062e1578057a475a9e5fa7fba6d4764cccda98dc2dabd7d1fe27b3c570c70b39bccad0c75f5ad50b36f5d76cf671545d9968c1984da46dd2b7aeb29e41bc02f57c3a93d64f5d6fb40f20ec1a6bbba8c0d84885701a1"}, {0x100, 0x334, 0x3, "983db67157a7f4d67382bb6f4a3ce3b84352879fb27e3fd26a406f684b121601ab7cf58b41e9da04870d0371be66e8bb92dc4a34ad35458c4a1cc75efe8ac41ba4999631cf892485b99a0b4bd11af0c7a676aed94e171f0750e3737577c2b7b097fa6e9e80ae67e18607a932534ed525cef2377f91862528a4491b7e67eabff1ec05505fb47e6bca4ad52462ad6d3a13d5014b0f6bbc5688bd7cf51a57e73e79af7a77d088a4475526b7d0760f6e21cad4d77360a6050944fbf57a595cfc103f8e91209b44c299b45a11d7c814a5b19bfa5b5e65be81a7822ff64b062455d38af249ec69dcf4be9223795199a52e"}, {0x180, 0x112, 0x1ff, "91f93df86b158ea2961908636e63beefcc88425dfd27be654a99ab8cb365dc06dad84be8c0cb97ca5372f95947601d425bf4016830a9cdfe378dd60f0905862b913baabab251554155b3ade59d521eca5ad8fe588aaaa401b9a4cf8aa6758a3535f0a52be5a400cab1dc7da45016a35bb3296127f06f98f623488f7d6a1e9e2fb4fc86952697c3697fd03cf07061d0b0ce02cdd6efc3b1e5acfa7dbff55b43516330ad94673c8441aa68697c8a30b7d783305c0d41f4e1b15972bf59d512e673def845d623441b743bd7c37c6c0f77c3c2d467cd7eef40a2cdcdc4eb1d74651fddf60164d7a3ecc83e8c8aab278bea767dd9e8707eecd48c181cd938cd859396227161ee6094f69d4f719b6ecc937a3a7a3eeabaff31960e0674d2420ba680d4059666118bf6f5bc3ced4aea08f18dda42a7d43164b42dea47dc229c259bbd15f93f6dfff4b8cdc8b0ee65ee49b5760f8d664b53e2a9ff5b296186fabc7294036053b20b71cf9704f7877c27855a52"}, {0xe8, 0x4739239777c3f279, 0xcba, "f53cf8ae2d4b976c6906ad53e296be964fd77379006ade1e664fbb0c45f50c492fa6026c9f5b8e2cc6ea04e10a3cf34a8966da3ecad434a51fce7781010443761497b697819d35329cf52524c06dc59365081bee1bd8ce68788abf314ba0c789a8ed559e2e21baf511b56765d3cdca30e4d944bf0e23962931cd4622e75a72104bc46119f745a4802c88e329f6886a645abc76bb5612c4ff3b77289beb8d8264316a81f12ba2a172626f51b8730d9e2d05827dbb7e970fcd8c92f1935d47177c84a144aff5ce9d344b9e5b0db3321af9808983db132b4c"}], 0x5a0}}], 0x7, 0x3704ced8e4cf4ab1) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r4, 0x934, 0x0) dup2(r2, r4) r5 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r5, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:21 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) bind$packet(r1, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) r3 = syz_open_dev$swradio(&(0x7f0000000500)='/dev/swradio#\x00', 0x1, 0x2) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0xffffffffffffffe2) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0x3, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="18e3ec00009db77574ffff039d8600000000000000000000f1b92c7f52d149a274f55b177f974788472876eeb446ba7730b4e57af2c38be5cf8d2c418136b93288dde7301a79cdc8230cb2f18f6169a2d295212e01e73cd02fc3dad5d78d212f7b835f90b59e0eeac5e37c12f7ce5414a888ee2764e424ec0eab8f5c3d995c04bf2a334bd4ca822f46b7d38a83a218a49342527c60dbc6f4da0fbb3718fd424554d799c4c038a71ae52af5a9222c6a3e1a64517b008e2f26f629f5f388bafae94d0e1758d95c355c905c67427ae4a360edbb566fcd0ec276e73f9432bd321e75af4c4bb7b9d4b3695af6710d85a8dd62e09b2b8d804ac6bc01b8101e33976c1d4dfc6986a89c7a9e995695"], &(0x7f0000006b80)='GPL\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000000c0)={@dev={0xac, 0x14, 0x14, 0x1f}, @rand_addr=0x7, r4}, 0xc) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x6, 0x80881) ioctl$KVM_SET_TSS_ADDR(r7, 0xae47, 0xd000) set_tid_address(&(0x7f0000000140)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x8a0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r6}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r8, r9) write$FUSE_NOTIFY_RETRIEVE(r9, &(0x7f0000000380)={0x30, 0x5, 0x0, {0x0, 0x0, 0x1, 0xcae}}, 0x30) 14:41:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xb704, 0x100000001) 14:41:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd7db06ea4b7208c2ea79a4cdd9bcc4fe47a69485105dfd921fdf9886fbdcb911eab3caf8637192459785b6b5b4a465a15403831144af29ee48bba549db8cc6e4252952d4210e2e590141cd1519477f5b75bdb9763ee4fd4cfafaf4a671997efac44c15053368496253c1e894a0c278c206d9b18080c789b030528c60002b3b6a497fcf6fd7b303388a868b10668886db1fbf16f2c76ad398522b52aa88c03151144e50efdcc4e0f6299e8cb8c2056120d1474a9f3bc963a1760168c093f71675bdd56755496427246580657"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000000)=0x400, 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:41:21 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:21 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={0x0, r2, 0x11}, 0x10) 14:41:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40045431, 0x100000001) 14:41:21 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x934, 0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x934, 0x0) r3 = dup2(r1, r2) ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000000)) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a0600000001004d"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 14:41:21 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="3900001a060000000001001700000100cdd6cfea469d1a3f4d63e002fa5799bd25f452e1a4f6085664871c4feeb414f6efecb8244d051b7347c530d78796e2008bc137c714422b0b4e093e00e7a3c16a499eb1a7f06dda4cc99a1357965186640a6edc4edc2619d581381b23b1805b9100a78724a4c1fc1f5cfbf7eab25cfdee7bb67066850698213327c83f67d91810a8f5c01b92ddff5f6ab1db84dd1ceeba3daa96cc9b740374909d96d4e8d28ab72cacc8c798a00adbb77a43cf877e8d7fced8321f32"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:41:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40045436, 0x100000001) 14:41:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400454ca, 0x100000001) 14:41:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/99}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x1ff, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 14:41:22 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f646501000000000000003030303030303034303030302c757365720200643d95f43715055e6a8a565f815f5d19add8af569c852a7dd6f9b0ebf564955f83285f236fa43796330e3e5836eec01cb44ffa33170a1f2b92e131ab29dcd1239fa4b209cad57c92e4ebd3e35fbb3cbd9c16daf5f32900166acfab5bb66e65b234e349e8ebeabe350d1a34839bceb20a75ac9bb5915f47803295df98a30656ae44460a66c454117e5efde95f5707ec93662e96b8106647a500a3520c488d38c04ab0f6f2be3447613fa7e721462adb5da158d0951eaae48e0f95c582bfd0ec6c758f4dc9a722070e8ff4", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400454d8, 0x100000001) 14:41:22 executing program 4: clone3(&(0x7f0000000500)={0x34080000, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), 0x3d, 0x0, &(0x7f0000000380)=""/74, 0x4a, &(0x7f0000000400)=""/208}, 0x40) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) getsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, &(0x7f0000000580)=[{}, {}, {}, {}], &(0x7f00000005c0)=0x20) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, 0x0, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f00000000c0), &(0x7f0000000100)=0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x200, 0x0) getsockopt$bt_BT_POWER(r5, 0x112, 0x9, &(0x7f0000000180)=0x4, &(0x7f00000001c0)=0x1) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/?\x93\xbd\x0e\x91\xd8<\'', 0x800, 0x0) r7 = semget(0x1, 0x3, 0x80) semctl$SETVAL(r7, 0x3, 0x10, &(0x7f0000000540)=0x10000) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r6, r8) ioctl$sock_SIOCGIFCONF(r6, 0x8912, &(0x7f0000000240)=@req={0x28, &(0x7f0000000200)={'ip6gre0\x00', @ifru_hwaddr=@remote}}) r9 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r9, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x80000000002c00) [ 626.404327][T18466] fuse: Unknown parameter 'rootmode' 14:41:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40045594, 0x100000001) 14:41:22 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'\x00', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffc}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:22 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r4 = dup2(r2, r3) ioctl$RNDADDENTROPY(r4, 0x40085203, &(0x7f0000000400)={0x8e94f0c, 0x60, "3f3b07d629f913ed8c692e238f6f195c7e192789a5381dd7ca31a2f6765a6f731f51165cdd27aba9d419965d80fff4fbb1a20dbe4c1d8215796e443f75a943f37f51e169b8e23532f173ba71cfdec3238e95773b17e984de243b20426381c9e4"}) socket$vsock_stream(0x28, 0x1, 0x0) statx(r2, &(0x7f00000003c0)='./file0/../file0\x00', 0x100, 0x80, &(0x7f00000002c0)) 14:41:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:22 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10000, 0x0) recvfrom$unix(r0, &(0x7f0000001640)=""/173, 0xad, 0x0, &(0x7f0000001700)=@abs={0x2, 0x0, 0x4e22}, 0x6e) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x2) ioctl$NBD_DISCONNECT(r0, 0xab08) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40049409, 0x100000001) 14:41:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone3(&(0x7f0000000240)={0x80040200, &(0x7f0000000040), &(0x7f00000000c0)=0x0, &(0x7f0000000100), 0x12, 0x0, &(0x7f0000000140)=""/214, 0xd6, &(0x7f00000002c0)=""/65}, 0x40) wait4(r0, &(0x7f0000000340), 0x8, &(0x7f0000000380)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000440)='/proc/capi/capi20\x00', 0x101000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0x6, &(0x7f0000005580)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, &(0x7f0000005640)=0xb0) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r9, r10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r10, 0x84, 0x72, &(0x7f0000000480)={r7, 0x6}, &(0x7f00000004c0)=0xc) r12 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r13 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r12, r13) r14 = openat(r13, &(0x7f00000005c0)='./file0\x00', 0x20, 0x3) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r14, 0x84, 0x66, &(0x7f0000000600)={r8}, &(0x7f0000000640)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000500)={r11, @in6={{0xa, 0x4e20, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xf6d}}}, 0x84) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r15 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r15, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 14:41:23 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000980)='/dev/null\x00', 0x200, 0x0) connect$netlink(r2, &(0x7f00000009c0)=@unspec, 0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 14:41:23 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x4, 0x3f, 0x0, 0x4000000000, 0x100000001], 0x21000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:41:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x4010aeaa, 0x100000001) 14:41:23 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000002c0)={0x1, r2}) 14:41:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x4020940d, 0x100000001) 14:41:23 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000280)={0xffffffffffffffff, r0}) mkdir(&(0x7f0000000180)='./file0\x00', 0x13d) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="666455927a08c48276046040a3b8c979e5a754bf7b974001d486a4ee3e1863754014721d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',\x00']) mkdir(&(0x7f00000001c0)='./file0/../file0\x00', 0x4) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40004000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@RTM_NEWNSID={0x1c, 0x58, 0x800, 0x70bd29, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r6) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x100, 0x0) linkat(r3, &(0x7f00000002c0)='./file0\x00', r7, &(0x7f0000000400)='./file0/../file0\x00', 0x400) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="390071ef660124b5a5211f0300c31d06a96dd37c11a593c4b97dcf98958011313edd121a5d487332e7aa490c2723671f5512"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 627.571607][T18741] fuse: Unknown parameter 'fdU’zÄ‚v`@£¸Éyå§T¿{—@Ô†¤î>cu@r0x0000000000000004' 14:41:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x4020ae46, 0x100000001) 14:41:23 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000130000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='lgroup_id=', @ANYRESDEC=r3, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045430, 0x100000001) [ 627.977191][T18767] fuse: Invalid rootmode 14:41:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000003403d00bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:24 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getrandom(&(0x7f0000000240)=""/170, 0xaa, 0x2) 14:41:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045432, 0x100000001) 14:41:24 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x10) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0xfffffffffffffe8d) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$MON_IOCQ_RING_SIZE(r3, 0x9205) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x20800, 0x0) openat$cgroup(r4, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r5, r6) getpeername(r6, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, &(0x7f0000000040)=0x80) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r8, &(0x7f0000000140)={0x0, 0x81, &(0x7f0000000340)={&(0x7f0000000080)={0x20, r9, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0xfffffffffffffe62}]}]}, 0xd}}, 0x0) sendmsg$IPVS_CMD_ZERO(r7, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r9, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x181, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x800}, @IPVS_DEST_ATTR_WEIGHT={0x77}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004000}, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0xa00300, 0x0) r11 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0xf0082, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r10, r11) ioctl$SCSI_IOCTL_SYNC(r11, 0x4) [ 628.251448][T18741] fuse: Unknown parameter 'fdU’zÄ‚v`@£¸Éyå§T¿{—@Ô†¤î>cu@r0x0000000000000004' 14:41:24 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) setsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f00000001c0)={@multicast2, @rand_addr=0x5}, 0x8) [ 628.448177][T18819] fuse: Invalid rootmode 14:41:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045438, 0x100000001) 14:41:24 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="0f42", 0xfffffe4c) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x20002, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) read$alg(r4, &(0x7f0000000240)=""/119, 0x77) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401], 0x0, 0x2000}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 14:41:24 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f00000002c0)=0xc) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) r4 = socket$isdn_base(0x22, 0x3, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0/../file0\x00', 0x4806, 0x69) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r4, &(0x7f0000000340)={r5, 0xffffffffffffffff, 0xec15}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045439, 0x100000001) 14:41:24 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="000700001d6d6a5f42674d77e3c0000000000000", @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045440, 0x100000001) 14:41:25 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000003c0)=0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, r4, 0x0, 0x7, &(0x7f0000000400)='user_id'}, 0x30) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x20, 0x0, 0x6, 0x0, 0x0, 0x2, 0x144, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x9, @perf_bp={&(0x7f0000000300), 0x4}, 0x8000, 0x20, 0x5, 0x2, 0x0, 0x4}, r3, 0x7, r6, 0x8) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r7}}) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./file0/../file0/file0\x00') umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:25 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f00000002c0)={0x0, 0x0, {0x2, 0x4, 0x6, 0xffffffff}}) 14:41:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x800454d2, 0x100000001) 14:41:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045530, 0x100000001) 14:41:25 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x5) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='f\x84ce\x00', 0x0, &(0x7f0000000240)={{'Kd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'rrop_id\x00', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000240)=""/143) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 14:41:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x800455c9, 0x100000001) 14:41:25 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:25 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="646403", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="2c009bb8e7b118c4ff7c1717da73323708efc49b06353f0f410165c9aacfc90881388cd9c01048bb0b87a1e2f4d89cca45dcf902b97ccdc3e5ba334ace4a46b88a93a89f691e79c4f6cc3459d5374e96b063efd147fbf485410d119a3a12188f"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) quotactl(0x10001, &(0x7f00000001c0)='./file0\x00', r3, &(0x7f00000002c0)="225dea9709d685dce6ff2e929c25307eb37ba9d0c9cb3530f50cdd8013821980") umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x800455ca, 0x100000001) [ 630.005947][T18966] fuse: Unknown parameter 'dd0x0000000000000003' 14:41:26 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000240)={0x0, @frame_sync}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d1cbc474e16f9c70621f6d52818cf5f788320f54896b54cb1aaee8af16bb6b5373b056d604f976fc30e38f17b5f01a5c7fa398d956a5487aa0a76a59e264e7c3b76aa1380f4052cc97b3b286a2dc8fc234cdde2a1fbb97cf51b477b30b7b88bac2f4c296c4eedbe9a3cf7d61ed784e906590df2f71f32173f53d5520fb012109d514a5a8c33c235890b68e5aa51b1ffddcda23a", @ANYRESDEC=r2, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:26 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x4, 0x200042) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 630.313263][T18984] fuse: Bad value for 'group_id' 14:41:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x800455cc, 0x100000001) 14:41:26 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="f350e4bcfd3d17eebc5f624057e90109481a7ff36c000000000000008476c3b805d06c6db24ab743b527ee7048e0cb2ceb8d1a23127b7440eb57494275d76862c8937ac781150800fd6b6cc26fa9914d62e2641bbc019c2ec20c7d3233bf6c5418caa41dc441e7dbdf4594eab839bf5ea0e9ff252b9b54db5c9779e80e43f4cbf062c734bc5f17483f4c1f046f66013e236f85febbdf68e2226855174dcc2b772412c062a1e23b915b5a785ac519464b40c4d2308f0000deb6c3bcf491b762e518d3de3d90a007c37a23615202058ff3e6b846e6fcbb54c8c233c99d04c6f8b38f54", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)=""/126, 0x7e) [ 630.396770][T18990] fuse: Unknown parameter 'óPä¼ý' [ 630.425114][T18990] fuse: Unknown parameter 'óPä¼ý' 14:41:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80086301, 0x100000001) 14:41:26 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@hash='hash'}, {@uid_gt={'uid>', r3}}]}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:26 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x5, 0x401}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 630.690913][T19008] fuse: Unknown parameter 'hash' 14:41:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc0045878, 0x100000001) 14:41:26 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="12812c02"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 630.872569][T19014] fuse: Bad value for 'group_id' [ 630.901295][T19014] fuse: Bad value for 'group_id' 14:41:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc0045878, 0x100000001) 14:41:26 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='f\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 631.080960][T18984] fuse: Bad value for 'group_id' 14:41:27 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x8, 0x3, 0x5, 0x300000, 0x3ff, 0x5}, 0x1c) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fcntl$setflags(r0, 0x2, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030023030304a2c757365725f00003d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB="2c8261352fc1526f43e3bb9b4dc800"/24]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc0189436, 0x100000001) [ 631.300430][T19034] fuse: Bad value for 'rootmode' 14:41:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:27 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x934, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r3, 0x934, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r2, @ANYRESHEX=0x0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303020303074dcf16a05c12d9b65725f69643d", @ANYRES16=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYRES64=0x0]) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x800040, &(0x7f0000000440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}], [{@subj_type={'subj_type', 0x3d, '/proc/self/net/pfkey\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x64, 0x32, 0x65, 0x55, 0x0, 0x0, 0x35], 0x2d, [0x35, 0x66, 0x31, 0x35], 0x2d, [0x61, 0x64, 0x38, 0x37], 0x2d, [0x36, 0x35, 0x65, 0x63], 0x2d, [0x65, 0x38, 0x31, 0x39, 0x33, 0xeca4c50a926a0033, 0x33, 0x64]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/md0\x00'}}, {@subj_user={'subj_user', 0x3d, '^self'}}, {@obj_user={'obj_user'}}, {@subj_type={'subj_type', 0x3d, 'cgroupposix_acl_access\aem0wlan0'}}, {@subj_role={'subj_role', 0x3d, '+'}}, {@dont_measure='dont_measure'}, {@func={'func', 0x3d, 'MODULE_CHECK'}}]}}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x978b601ae2d659b4, 0x0) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f00000002c0)) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3900000b4637f830db1a060000000001001700000100cd"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000180)=0xf4240) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:41:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc020660b, 0x100000001) 14:41:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc04c5349, 0x100000001) [ 631.505718][T19050] fuse: Unknown parameter '0xffffffffffffffff0x0000000000000000' [ 631.522932][T19050] fuse: Bad value for 'fd' [ 631.569569][T19050] fuse: Unknown parameter '0xffffffffffffffff0x0000000000000000' [ 631.583230][T19055] fuse: Bad value for 'fd' 14:41:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0xdffffffe}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="4ef2faff32460000002f006ce00000017fffffff830cc6400323000000000000070b04e00000000009000b00108d994fd1826b00180010df"], 0x44) 14:41:27 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r0, 0x400, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) rt_sigprocmask(0x0, &(0x7f0000da1000)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000200)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) truncate(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x2) 14:41:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000002) [ 631.769128][T19070] fuse: Bad value for 'rootmode' 14:41:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0xdffffffe}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="4ef2faff32460000006c006ce00000017fffffff830cc6400323000000000000070b04e00000000009000b00108d994fd1826b00180010df"], 0x44) 14:41:27 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) write$P9_RWRITE(r2, &(0x7f00000001c0)={0xb, 0x77, 0x3ff, 0x8001}, 0xb) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[], [{@fowner_lt={'fowner<', r3}}]}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000003) 14:41:28 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x201, 0x802) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f0000000140)) [ 632.049169][T19088] fuse: Unknown parameter 'fowner<00000000000000000000' 14:41:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x26, 0x705, 0x0, 0x0, {0x0, 0x0, 0xb00}}, 0x20}}, 0x0) 14:41:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000004) 14:41:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0xdffffffe}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef2faff32460000002f006ce00000017fffffff8302c6400323000000000000441808e00000000009000b00108d994fd1826b00180010df"], 0x38) [ 632.525553][T19088] fuse: Unknown parameter 'fowner<00000000000000000000' 14:41:28 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() getpid() pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r2, 0x0, 0x320f) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000000)={0x0, 0x0, [0x1, 0x3ff, 0x10c, 0x1f]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000180), 0x10) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000180)={0x80000000, 0x0, 0x5}, 0x10) write(r3, &(0x7f0000000080)="240000001a005f3814f9f407000903018000200000000000000000000800020040000000", 0x24) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x7}, 0x8) [ 632.589227][T19105] debugfs: Directory 'hci0' with parent 'bluetooth' already present! 14:41:28 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x802) readv(r0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/95, 0x5f}], 0x1) 14:41:28 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) msgsnd(0x0, &(0x7f0000005600)={0x2}, 0x8, 0x0) 14:41:28 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x1, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)=r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x1000000000000f, &(0x7f0000000180), 0x2ca) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000009000), 0x4) 14:41:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4f", 0x76}], 0x4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 14:41:29 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INIT(r0, &(0x7f00000002c0)={0x50, 0xfffffffffffffff5, 0x5, {0x7, 0x1f, 0x81, 0x1, 0x4, 0xfff, 0x7, 0x1}}, 0x50) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000340)=0x78) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="2c00a590dc5b785518340355051e2540236a6a8298c998735ce10364ed9dcc3f4e0fd57336a895915e0982cf3f75bbea4581c03767d481735e60279ff47f01a856f8f10d2732f0245b40ddc7e651d07267951b118df67eddf57ff31d30003108d9defd9c54628d4053deb75b1b8321cebfef985cb17bc6e1cb6f823d6fc8dacece1a8c79a0b50679782dd293610963c52b1cd7f931e895fba96113e9f4273cb62b690a7e324b4fc148460097df84d197d89fcc633572c94544d7c53ac1fe2e6ee702a20bdcf56a2856ea01d77fc22420290d20"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x20400, 0x0) 14:41:29 executing program 3: prctl$PR_GET_DUMPABLE(0x3) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000400)={{{@in, @in=@loopback}, {0x0, 0x1000000000, 0x0, 0x0, 0x6}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffe00}}, 0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @rand_addr="000000001000"}, 0x1c) pipe2(&(0x7f0000000080), 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) syz_open_procfs(0x0, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) 14:41:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) open(0x0, 0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@dstaddrv6={0x1c, 0x84, 0x8, @empty}], 0x1c}, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x0, @local, 0x100}}}, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f00000002c0), 0x3a9) 14:41:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:29 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$SO_J1939_PROMISC(0xffffffffffffffff, 0x6b, 0x2, &(0x7f00000001c0), 0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0000c3212c97df6d7a92", @ANYRESDEC=r1, @ANYBLOB="2be3"]) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 634.687775][ T12] Bluetooth: hci0: command 0x1003 tx timeout [ 634.693918][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 636.767940][ T12] Bluetooth: hci0: command 0x1001 tx timeout [ 636.774075][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 638.847861][T16580] Bluetooth: hci0: command 0x1009 tx timeout 14:41:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000005) 14:41:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0), 0x4) 14:41:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 14:41:38 executing program 2: mkdir(&(0x7f00000002c0)='./file1\x00', 0x184) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) utime(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000240)={0x100000000, 0xfffffffffffffffe}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c4300000000000000009054f66b69e38b58e6acc61ff83ea94a47d4b3fe2d3474a2f81e8e171f755120fccdcc7bf66542b77367227375cd09167427ccc2fa5aa03d", @ANYRESDEC=r1, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x48100, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0xffffffff, @empty, 0x3}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r2, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(r0, 0x4, 0x4000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x149080, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8}) ioctl$DRM_IOCTL_SG_FREE(r5, 0x40106439, &(0x7f0000000180)={0x200, r6}) ioctl$VIDIOC_SUBDEV_G_SELECTION(r3, 0xc040563d, &(0x7f00000000c0)={0x1, 0x0, 0x101, 0x9e26eb389fb3d784, {0xf35, 0x45, 0x81, 0x3}}) 14:41:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:38 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_MCE_KILL_GET(0x22) 14:41:38 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x181042, 0x0) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f00000002c0)=0x5) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000007) 14:41:39 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @remote}, 0x1c) 14:41:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000008) 14:41:39 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit(0x0) r1 = dup2(r0, r0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/32, 0x20}], 0x1, 0x0) 14:41:39 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$midi(&(0x7f00000001c0), 0x800000000005, 0x329441) accept$unix(r0, 0x0, &(0x7f00000002c0)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000400)={'bond_slave_0\x00', {0x2, 0x4e20, @multicast2}}) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000300)=@gcm_128={{0x304}, "84007ca4ab12ddf5", "591591a906f6c369458fb76c9a8b4dab", "6d838377", "adb0d35aa3cc0d42"}, 0x28) r2 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) chown(&(0x7f0000000340)='./file0/../file0\x00', r2, r3) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r4}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r6, 0x934, 0x0) r7 = open(&(0x7f0000000480)='./file0\x00', 0x420400, 0x1) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x9) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r8, r9) ioctl$VIDIOC_S_CTRL(r8, 0xc008561c, &(0x7f00000004c0)={0x8, 0x3f}) sendfile(r6, r7, 0x0, 0x16) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x4) dup2(r5, r10) write$USERIO_CMD_SEND_INTERRUPT(r5, &(0x7f0000000440)={0x2, 0x97}, 0x2) r11 = syz_open_dev$cec(&(0x7f0000001900)='/dev/cec#\x00', 0x1, 0x2) connect$can_bcm(r11, &(0x7f0000001940), 0x10) 14:41:41 executing program 3: 14:41:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x10000000a) 14:41:41 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) fcntl$setstatus(r3, 0x4, 0x2000) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r4, 0x934, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x20010, r4, 0xb46d4000) 14:41:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:41 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x201, 0x802) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:41:41 executing program 1: 14:41:41 executing program 1: [ 645.917260][T19331] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 14:41:41 executing program 3: 14:41:41 executing program 2: 14:41:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x10000000b) 14:41:42 executing program 2: 14:41:42 executing program 1: 14:41:42 executing program 3: 14:41:42 executing program 2: 14:41:42 executing program 2: 14:41:42 executing program 1: 14:41:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000010) 14:41:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f00000003c0)={&(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/187, 0xbb}, {&(0x7f00000002c0)=""/111, 0x6f}], 0x2, &(0x7f0000000340)=""/128, 0x80}, 0x20000) setsockopt$inet6_tcp_int(r1, 0x6, 0x67a357cbfc7715a7, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4200, r2, 0x6d, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r3, r4) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f0000000040)={'eql\x00', {0x2, 0x4e24, @local}}) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:42 executing program 3: 14:41:42 executing program 2: 14:41:42 executing program 3: 14:41:42 executing program 1: 14:41:42 executing program 2: 14:41:42 executing program 3: 14:41:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000025) 14:41:42 executing program 2: 14:41:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@ipv4}}, 0xe8) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) 14:41:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x33b040, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000200)={@loopback, r3}, 0x14) sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x82042002}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x810, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x40) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:43 executing program 3: 14:41:43 executing program 3: 14:41:43 executing program 2: 14:41:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000064) 14:41:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@ipv4}}, 0xe8) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) 14:41:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:43 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3984000000001a000000000000000000", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:43 executing program 3: 14:41:43 executing program 2: 14:41:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000300) 14:41:43 executing program 3: 14:41:43 executing program 2: 14:41:43 executing program 2: 14:41:43 executing program 3: 14:41:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000394) 14:41:44 executing program 2: 14:41:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@ipv4}}, 0xe8) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) 14:41:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:44 executing program 3: 14:41:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000398) 14:41:44 executing program 2: 14:41:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000040)=@srh={0x2f, 0x6, 0x4, 0x3, 0x94, 0x8e578dc27656d182, 0x7, [@empty, @remote, @loopback]}, 0x38) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x40, 0x8, 0x8, 0x0, 0xc5, 0x20018, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x28, 0x7fff, 0x10000, 0x7, 0x5, 0xfffffffc, 0x8001}, r2, 0xd, 0xffffffffffffffff, 0x8) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:44 executing program 2: 14:41:44 executing program 3: 14:41:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bc9) 14:41:44 executing program 2: 14:41:44 executing program 3: 14:41:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bca) 14:41:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@ipv4}}, 0xe8) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) 14:41:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b70200000340000ebfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:45 executing program 2: 14:41:45 executing program 3: 14:41:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bcb) 14:41:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000040), 0x4) 14:41:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@ipv4}}, 0xe8) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 14:41:45 executing program 2: 14:41:45 executing program 3: 14:41:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bcc) 14:41:45 executing program 3: 14:41:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bcd) 14:41:45 executing program 2: 14:41:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:46 executing program 3: 14:41:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bce) 14:41:46 executing program 2: 14:41:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x4) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x22, @local, 0x40001}, 0xfffffffffffffe6c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@ipv4}}, 0xe8) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:46 executing program 3: 14:41:46 executing program 2: 14:41:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bcf) 14:41:46 executing program 2: mq_unlink(&(0x7f00000002c0)='/route\x06\x00') 14:41:46 executing program 3: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r3, 0x40047438, &(0x7f0000000040)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r5 = fcntl$dupfd(r2, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000140)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r1) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 14:41:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x20) ioctl$VIDIOC_ENUMAUDIO(r2, 0xc0345641, &(0x7f00000000c0)={0xa313, "6a5296922e08b51d93f0de4e67811d52b26ba62cdcb9b9cb1cc2f27356262916", 0x1}) ptrace$cont(0x20, r1, 0x5, 0x60) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:47 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) open(0x0, 0x141042, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001380)=[{0x0, 0x13d}], 0x1, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r5, 0x29, 0x3e, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3e, 0x0, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r6, 0x29, 0x3e, 0x0, &(0x7f0000000040)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3e, 0x0, &(0x7f0000000040)) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3e, 0x0, &(0x7f0000000040)) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3e, 0x0, &(0x7f0000000040)) r7 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r7, 0x29, 0x3e, 0x0, &(0x7f0000000040)) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3e, 0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r9, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 14:41:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bd0) 14:41:47 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x4003) close(r0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000880)='/dev/uinput\x00\x82\xf9E\x89\x17\xcd\xa9\x9b\xb3\xe3\x1e\xb1\xbb\xd1\x16e\xd7\xc5\xcd\xb5\xec\xa5\xbe\xcd\xd7if\xf3\x96\x8f<\xa0%\xb6\x03fm?\\\x19\xa2\xab\f\x82\x18\x13\xf54c)\xd5PB\xc8\xa66\xe2\xc7\x18\xe0L\x18^A\x8a\x9d\x1f:\xcd\xb3-\xf4j\xfa\xb1\x1et\xd2\xdbU\a\a\x17\x97.\xaf\xa1*\xf6\x9cuV\x868-\xd9\x03\xc4\x8b\xf3\xa0*wJyP\x9b\x9a\xc9\n\xce\x822\xe2l\x0eX\xe9\xcd#\xf5\x83\x97\xe3T\xf3\xd7\x8e\xb8\x826\xa3\x14\x8f\xc9\xe6_ (\xc6\xb7\xd0\x186J\xb8\xa9\x9e\x96\x85\xb2\xd4\xbdd\xedj\xb1/\xf6)\xd1\x16e\xd7\xc5\xcd\xb5\xec\xa5\xbe\xcd\xd7if\xf3\x96\x8f<\xa0%\xb6\x03fm?\\\x19\xa2\xab\f\x82\x18\x13\xf54c)\xd5PB\xc8\xa66\xe2\xc7\x9e2\xd6N\xaa\xaa\xfe\x7f\x18\xe0L\x18^A\x8a\x9d\x1f:\xcd\xb3-\xf4j\xfa\xb1\x1et\xd2\xdbU\a\a\x17\x97.\xaf\xa1*\xf6\x9cuV\x868-\xd9\x03\xc4\x8b\xf3\xa0*wJyP\x9b\x9a\xc9\n\xce\x822\xe2l\x0eX\xe9\xcd#\xf5\x83\x97\xe3T\xf3\xd7\x8e\xb8\x826\xa3\x14\x8f\xc9\xe6_ (\xc6\xb7\xd0\x186J\xb8\xa9\x9e\x96\x85\xb2\xd4\xbdd\xedj\xb1/\xf6)0x0}) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@ipv4}}, 0xe8) 14:41:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) connect$netlink(r1, &(0x7f0000000200)=@proc={0x10, 0x0, 0x25dfdbfd, 0x50830002}, 0xc) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040), 0x4) r3 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r6, r7) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r8, 0x84, 0x6, &(0x7f0000005580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, &(0x7f0000005640)=0xb0) getsockopt$inet_sctp_SCTP_STATUS(r7, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x9, 0x1000, 0xde02, 0x4, 0x3, 0x92fc, 0x400, {0x0, @in6={{0xa, 0x4e21, 0x7ff, @mcast1, 0xa22a}}, 0x4, 0xffffffff, 0xf28f, 0x1, 0x4}}, &(0x7f0000000180)=0xb0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f00000001c0)={r9, 0x6}, 0x8) ptrace$setopts(0x4206, r3, 0x0, 0x0) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r11 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r10, r11) r12 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r13 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r12, r13) getsockname$packet(r13, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14) bind$can_j1939(r10, &(0x7f0000000380)={0x1d, r14, 0x1, {0x4, 0xff, 0x2}, 0xfe}, 0x18) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x5) 14:41:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bd1) 14:41:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@ipv4}}, 0xe8) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 14:41:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bd2) 14:41:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bd3) 14:41:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 14:41:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bd4) 14:41:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 14:41:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() uselib(&(0x7f00000002c0)='./file0\x00') setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) modify_ldt$read(0x0, &(0x7f0000000300)=""/180, 0xb4) ioctl$BLKPG(r4, 0x934, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r5, 0x400454ce, r6) r7 = getuid() r8 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x6, 0x155a82) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x100082d, &(0x7f0000000100)={'trans=fd,', {'z{dno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@afid={'afid'}}, {@msize={'msize', 0x3d, 0x1f}}, {@access_any='access=any'}, {@nodevmap='nodevmap'}, {@version_L='version=9p2000.L'}, {@access_any='access=any'}, {@access_user='access=user'}, {@access_client='access=client'}, {@aname={'aname', 0x3d, 'selinux'}}], [{@subj_user={'subj_user'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@fowner_lt={'fowner<', r7}}]}}) 14:41:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bd5) 14:41:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@ipv4}}, 0xe8) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 14:41:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bd6) 14:41:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bd7) 14:41:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bd8) 14:41:49 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f00000000c0)={0x1, 0x5, 0x100, 0x2, 0x2, 0x1}) ptrace$setopts(0x24fb6b258ea344f7, r2, 0x9, 0x60) 14:41:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@ipv4}}, 0xe8) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 14:41:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bd9) 14:41:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000003401d00bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bda) 14:41:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:49 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000040)) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bdb) 14:41:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bdc) 14:41:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:50 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:50 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/mixer\x00', 0x492e23, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) fanotify_mark(r1, 0xa4, 0x12, r2, &(0x7f0000000ac0)='./file0\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000980)=0xe8) syz_mount_image$exfat(&(0x7f00000001c0)='exfat\x00', &(0x7f00000002c0)='./file0/../file0\x00', 0x7ff, 0x7, &(0x7f00000007c0)=[{&(0x7f0000000300)="10711a833655f1cc4ff3825bcf76f5f2927d4f092d0cdc258457223f1e0b86a409e01d83d1786c846818138cfbaed19084b02b7fd395f23976e4b839f2dd9d0f99f2e7214c4d62fa0918e1fa1bb2daa7a54db29393adc28cc34ae005e7ce243d6fed504cd85b9f02e9a18df8beac5173da6fcc44d314ca008f400df0281ad1a68350d9f0e9172c632264b3f6bf35857cc5bf620e1f5cbc401b4144818595dd0ac4214ab69d647b551aa762aff9637d30d76664c75b3c30ca3e042ea7cd5fed23d31be7c0c509f591360418a410", 0xcd, 0xfff}, {&(0x7f0000000400)="8ee51746139a176a9bad3cb5cbd711f54da6bfa4d24a6612bdd340fc7d65638af22b78e34a6cbbb72919693ea2d9e556ac76e3d40f115dfa60d952f1f6270991ad4b558ab348ea8d91e2f99fd6cfc978350068f182158f42f93fe3e7cb37e67a91860edbf57ab88f0efb3ba9909fbb2bf04cfbaff17bbe83e4e35998236f7e3133858c259f0481558d660033884041bfa72c970e3dc688a791fa5dce470fde93a84f47b302b068", 0xa7, 0x33}, {&(0x7f00000004c0)="069bf6bed820c16a3c3b6bdbbeb34f3d6bc7687e4942cfcc57552513cd5af35032a3356396afa1f8e9440d975c031fc2c2d6bc95597faec42c055986766ca604e5c9bc4e16dffafd3a01921649d5b7ef722a7e3c23bd2d6be8b04737a84b044618e64ded5aee2d767777ce3504f5fc88f0b67bf9b445cb4bb12671dec4c0d7831dfbc1d7331ceac1838f9835559ae863dcbb5a19e9fa1559cb2c81de25c3186d5401851bb824ca2ccebac35bca4ff0589a4060006ab93c31", 0xb8, 0x4}, {&(0x7f0000000580)="d29000cafab5618c1e367a69350ebd8e80f2ed103386e9fb1950f454731b5ac470fe83790e816e7a774720e44f3cb64d1de42b84b94d5cd20e4b9adb7a5219884b1811685a40fe5e3ac4825d2885ef9deef17d7faef7cafe5f79d52e52fd0a00b13775df4a7865f5aa74fca3d8a66008b5dcf5ed15687d7ec63559325de3355fbec5ab774a8e182bff38067426ca4a807105750ac93f3efacba3be516c0732ece353958f3132e2f2b3e8ae70a945c8a7c0863327926edf840a813c9819eca25978dd0b5edda8ada9487c888c", 0xcc, 0x7}, {&(0x7f0000000680)="ffef7e017bd8e557ab80f51aa4ddf412bf73bdf948af4fb1370bfd846aa7526b4899b6d08f66d90a708f33db443efe5ae4324bd0cbfa052d417b9b01a0bffe09e414667019b537a0b80b0ef3133bf6d6c22045e3e35cf2a3e64b9b", 0x5b, 0x100000001}, {&(0x7f0000000700)="fc0b5941bfba1f062f821e4d1c06cedd9ecb4e2e82a6b2389319d127ed5dd4f88d6d35002bedc7411a8e3bec2c712ab64de242d36e51c27c3c3437c49a7f4ef9ba831174302b18e820afe274032bdcf0240fc09328796dc2c9070e0d5e79fbf64c29ab350b902fc602870c", 0x6b, 0x6}, {&(0x7f0000000780)="070f9a101f566f58aabc13d87402af49090ec13e043818da63bb96be4110d86d4f8ed3f51c0c651c4e9aa0b85d5672d54dd60e03424c25", 0x37, 0x3}], 0x100000, &(0x7f0000000b00)=ANY=[@ANYBLOB="756d61736b3d30303030303030303030303030303030303030303034302c636f6465706167653d757466382c6e616d65636173653d312c757466382c636f646570616765adc170313235312c6d6561737572652c736d61ffca405c2246c545dbfc636b6673666c6f6f723d2c7569643c", @ANYRESDEC=r4, @ANYBLOB=',smackfsfloor=fuse\x00,\x00']) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r5}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bdd) 14:41:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x1ff, 0x0, @dev={0xfe, 0x80, [], 0x1e}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0xe0c1a50b4789cd91, 0x0) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000200)={0xc6f19a0a3a14f602, 0x1}) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x8200, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000140)={0x1, 0x4, 0x3, 0x0, 0xc}) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) setsockopt$IP_VS_SO_SET_ZERO(r5, 0x0, 0x48f, &(0x7f0000000040)={0xc, @multicast1, 0x4e22, 0x4, 'ovf\x00', 0x10, 0x3, 0x1007d}, 0x2c) 14:41:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bde) 14:41:50 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:50 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017bdf) 14:41:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:51 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB="3900001a06d598d1cd34f997b9d82bc8d2d249382cbcfef37c38007e898bd0b011c2fca4f4eb7d4fc824f574e0c167bcb11ecda041edaaaad0e900c9134efa076960dc30ea5d011c7c1f3e963b020454b37e126867fcc41197450024f4c264a919513a5b79d7fa562cfa5a36ab93c2affa07182d0dda7bcda6c9bf6eff2dc845a67f0c63a94816efde4a85154ae0a4ed01b28f610dd6f857c90c86e472730323312a42"]}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$SIOCX25GSUBSCRIP(r3, 0x89e0, &(0x7f00000015c0)={'hsr0\x00', 0x1}) io_setup(0x3f, &(0x7f0000000000)=0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r5, 0x934, 0x0) r6 = syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x0, 0x4000) io_submit(r4, 0x3, &(0x7f0000000400)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0xb4dd, r5, &(0x7f00000005c0)="6f673966dfad440fa86d854fdbaae5aef50843241acf2db3c66002bf22ce8c86ccaabbe6f04c4d2cdc0b9c1ae1c8fcb02228f17886a89a07b5f27324a8c8ff3e5e228263f007f08da59e33ac07e428ba4ebfd42d4730806b7e23271863b5f9d11bff909ef193367a239a683983fcbeb57e3efc99a710b4835dbb37246c0054e7e1ece51f815ca6ab7f20aade2ef69341bf004bbde5af383543ce7bb6b0c5e6220ac930526d16b992fd15b2b50dbb0d19a7f815739388a95566636bc6b5a0af2aa692a4253240488050747bf2ae1e1ef2367e2456a2386bedf6ed3347ecaec5f5413e05be94f9c59cf10d4a928d8d41d49a0c65bc8d85b62698fc3ad7450cdd4e4dbf500002179f047f32463f36c13a53f46afd6f214d905b5533f389cdda57813dbfd4c2ccc55e03a2dfb7808f09ae381a4b156bd373d141095ecad84debe4442639790d2a90da08b5aeb07706952f807cc8affa8ecb218021f6d348d22d30b2340341a1b626a9dc4d40c0d5ba05a74aab9ff39e9c418476875847731669e807eef67f6036c9c730422fb00d009f8afd64d48b4da4b4686f2605ce5d85a480ee0fcd11589633e9cbc062804b350a5482d63b25aa66f57b1de4b6b4c3545de148a9a76f08f23b9bf339a63ec2f827db22c13d36abcbc18f2dad865388d03c36fa9a3c89406ba09a7ed108bccb13c32de6e2a3c517fa36b1c4e441c4c4b226dd3f488990acd6d05302c6ad77f6df3fd1967b54f74655cf70253035b00e29f99af5fd7068a543fdeaf27727dded5f4fb7ca05a7375612a310fbfca8b7dd9f84fc9107803d799b19ff5197002eacaaf8fa5d02b876e452a1af1f169fc9e865b8a69ee8b62e8fa8d3dacaeea746aff3b7db25bb77285c70e4d9703c5000e2a4478c73f56686e4ebe96e61812373293b12190a30e06f0508d0d07d22b65458d600dee91fe6377c5494420d0d5ab2d541ad5ecfade4fa5889179e67efe77be4012fdb708166da163e9d6f9eb74df038bf12126086a6401618a6bef8af70cbabc34d0ebc0fa75db807726c0f4e5864827f647df5fbe5f96eefa4d5de4c4dbf6d90f9e637b013f5332eb3c8afda96f6d280c03f84375dfd24348026ba6632742d968e6977291f792a879d4fc099ac285e2c48ecd07322c70adeafebe0dfaa6fca9b2544f8090b66cc50d7400108473a446be159979e6c3dcbfe5240984ed1d773b98847481d52b978fbf2a62f525dde00a99f0c9a09e62550dc392e30fde130138a4a3919e48f3af421cfe77c50f3d08feb537fa6be0bd15958bd2b78bf4cfbc01420564044a9ed9a96e3d9862bd32d5aee05805ab1cee1c64776156404e1a38402716093d2ef85b07f32f3eba8afbd35e9a879860f75057658c214f6f7ffc006a1a81a0157050677e0dfd601285f7ecb4a4e4a73919af4026c6fe293151cb5e926ff528cc30d3e90a1d9709640cd98f478e57bbc73d5bd5c28a9d0ac668e5a4b2f6108e92ba766ef5fd0735f61a5f56c5472b12bb55fcb45eb17cbfd47ed34f99a6243870dfd6233ab782dbde99c75828dc80b279ccf236002029b2442cd0bed6a4820a1202e18139c52550746c6c7b7b28a1fc29c14990e486c17d664036b08fa4494090b728b684dc62ba558dbce906241153fc01ce54c9832cae42407d17014e8e48627fc846d72580fc378eef8a6b80f7d59f8ba8e3f3c4603ef25f4bb931295a46910e05e8a992240030c4a90973cdd971b0afb4bf59559a32f3ba891627c761c6fed955af160c624951a6a28fc18bab24ae1c70b0e47b05cf9b77cb854cb29386959c8164997af7df0eec7f1f79785ceff71be66c7a740405f7ebbb29a235455fd224decfcf9984888fa56c6195e42c28f8f6bbe7e951dc922d02c50b8b9632ec0d21217d2b758261955ac6fb35d17583e6c076c52d781577a0aa80a057c7300bc3a91025113cbb176bb399f8badaacc57fe1e534d93c20dbb39baf35e451c0248e2163f21ac982cb1828d619750e615082bd27d691739a70b4fc7a56ab5a73a1e4b26e93623d933d32b5e4c3c516d7f82f264c883bfb3f15d945062b12fff579babb2338932e275564d04f565321e2fae4f36303ac3c7533ee53c5d1ae175f77bab45f06dc57dd5f4230c387db6fc1cdb7abeeeb3ae8c3ee3e1162b3d1c6ffaf7f4ce61a2f2213788cce5d7a65a4c83e9383b8e5ec0ac1381d1914bf369f818a1eff66fe5fa9b2ce90e3cf19b429ddb657328c344bf0d8f3f87bb5d67c17844199595e39e5e6c1ff1824ef89b0604d6bf5bc614844199eb3b350b9596b3afa41b4cab970e2b47179748a39c83eaf8307391f8ee2bfae37818041584cfedb693f8ff640db21d07226e602e2747d0f747b7a7ad5b2a387896749eb786fcf9936d22068e0628e245f690a8c54a3333c1ced6ed6e86ec38bffe76a0374bb785710ea0b10b7864d515ba37235c08153c4ec2f4af45c07bf549b9da59b80defa9c7283a20db9e7e01ef6dab1ab4cdc05cf7b5b7989191889f8f61fafbf57c4c659a8244d8ff2c610cbd4fb7d2dabde34c9ac9f3b2820e9de8f5115d7d8878e93cfeb694ca96c5288100b01fcc622887d10014239c3aec043e9dca67919f9f6e115f0cc8face19230ae3a3aaa9b0b7752274c225e1a1a32a4fbb66d76e3aa3c4c43e6d3088720fab33bf89d90327032d1b82af15d9b2723f4e6ca69653fa3dc0d740f652c07df5e8c4436c726fcb2fe211b0462264bde3a3d0e729f29bb1e7e1aaffb719c9bf8013825e91eb200e6be41452d2da2a73e0dda939c00139b2cac6a7337d0968f0bf9ab7ea36bab040c3f96151c90dbe04590c27e2d0f4f216bb4d313e96a50bee666d1422fb3c67ba505ed5bfd0540d9e45b6b7a8fabc72bf1e8367961500de82c7b562d3628d594832cdbae51d75a8a082eb15fd1be308348cece3a33574a5e50c40805e4c5e6172edab086bad05cafbd189f0d43f955c2a7d0afdc87cbf688ca8b1811492ee74ca1d556a2e3a8787e981c8af49c785c0d4edd4e51d6cb6f44243964c864332bc45e1fe114728a56b17d0cf5847415a6b4e1a6c2633239e0c48986cda7a55b5d24496805db3a5697b84c2b4f55382f42ecc33f15b56cadcb7475c420fefd9ab41934ceee581be12dfde43c2ac6e9ac7f7b5a41f93b96d1f85c1810b25c1d109a5d636b5bfd7a70f01561bba7d2f033acf350fb1b0f549c872ccb77613495131221a5e8c4478f63e5367199fe5aa969af4eeb74af143e2d7e213c727fcae39a281bcf35244366d036e656e0075604903c5a5ffb73fc986ce8121045801cf353e3f1049c83aa698e5ba6661028a3938a5176f61977330a6cee16979d2785d7f594a2aead901b2801451fa154740e20e8ee4f01783f0ed721286b34b8e86fe0199607db8396fae101e3802e02c8c5de3c0ba352f1dfcc7dbf33b313f51d008670dbd93d6ec6d3a56c0d9f84cd60aa5e2e75472b3a8df6a7ba03794a7cd9799fd2ba4e54255661d7bab7e5b72acfd75c647e5e558102c53b14784ef8a778135479eeefbe3bfa142cf47d1f701d077cc572404e3960df6b52a688df63edffee9a27206ff172162f718ad86566f875e3d3cece30afb098bfc91c0fdd37a9bfe7796b7a85fd2cc9cc41e0c4ac3f17061bdaf72554c839a86c23fd6f32eff26eaab1bf943889e600909d645d3da2e2b3bd1c32755fa5e7a07d04ca3d421d376248576a06067cd37574384b36c2620317b721af21969ad527017b25f9718b0781ba37067d616bed1680d621bb2099f608ba1e20acdec699cdda523b6044442608bd8bb4532a8e13788aacda6ee0dbb2f26109ec4373a9dd4b5e9fabe4d81a9cdeb9c9457b171c71ed61af10289b95d57165f1fbeff92ba2872d2d46feec1f2be3340a8838dc7e3695855f81d5e55bfe2bec290b2ec096709f2c5e1db906964dc4bcd812a699a63f4c09b1ea5ec4fab343380ddd03f3af173772cd3d0f5e3987f7737e87e802ff8e18a4a0f719e40962609983f8d6c4c7f65850ae3a3ceccce163232c655488b0243722dd1412c0fe97d56ede6ea2e533a4f5653d149118a5141758c03e642b486a3f3fe0ea00aeec0b820bb1f6a8e17b1bf7b391a66c7334e1ce0b4159cae0dbbf288dd1a21c5051826d965a7350cd5cefe9aefdce43cb761a030c0e0211b17b5a342758ade1c6646cd9ac37dd2b4944054672f78ae0f68df338da56ae8ee22149e8735fe4bb962c8eab0f92a7847c8f4b70b482d78b6d547e35618f87f3bb8cb29d783f10d72ceee7e1b160063b9bce4e0313448344f9ea78feb26d04d46c3f6d5444985bad3dc406e812eb4d69c1c42435e3c3b563a931c43ce30ab82b6818f5790f3d8512c679095f53e7fce63d83f25343c91946129b8175c51362d88500c20a85451b59bcf9c46e28956cb38df98f8f89c955e386beee767f860edea46749c466f01589f8012af7fb279e6f03dbd12a084be0b748589be30b672c8ca60e34e839945652ab8a4afda8f276ae832a741b4c8b30d4fc42c03d2f45eebbdab36d7077134afbe6ae39d72f3e8361c7a91bd748f195ffff0dc6b521164dd3982cb9798ece3e4d52f995aa6a79783519c7484b53a95956469dae48e2061008e06995dc56e64df815536d3843823c56ba554a9cefb39f652b52f7957d65c330c9af46d8afeda37410acdcda08aea0788e398abbe3f07d23b7daa2b0b15856548643a195e503fc51097eb33a2edeeab1470a9022a6563c6131e25c3d59dc10c964742987a2d5aefe9200c77daed042337f05afee58a30e11f00ace81364b4c0669cd35994174281aee3a0216745c89f27dbb9ecc91a3ff63c37ff89e66830f916e81f485caff65d4c0aac93576f44df1549c66958673d1431f8cfd6e1a1e470f5eb751a6f8609e01c394282f1b9df8d3ef7fa8c2ad9ba453a0fac582a76da2aeaa21d84bb832f244dc0a9fd27727bf2f5eb4146d0b253aa17234b790fbc4346900d8efc62d05b5a9b7d8fb44935556dd65d04344da152a097e3f6669465593edd2149971f59d9565d9882ca3dd4a911c74cee5c9c02ade99f213e5b730a73d9299c821fe1bd8ac03504675b25358ecd2e3d1c46628bc8f59b587b414b9a6c2a63e09981861c72d594029d40dad6017ac97a2773ccc362a98e91aff79daa3b4ae72ec59e476b4404be606e2d16c83a51dda8e03196d06e7d15ca276f5213c87e21b7334adfa16c6c5dcccdf4c7653694d1560d5485ed445786042108e58e9dcd30216a6fbdaa1dd9e4ce3fb25f386c1d4f8ee46eb704e5424c0b21a97a51a6c9d4b39441fb2c3259c64dbe2b0ba35dca68a8b4be09798ea3a9d77ed9b39a3b4553d939c5e016187d63bbd3260937262c79384f42c416deab1fc78061a8a82013180c350ca58151100b7a8168597d9b75b86edebd2639b8d9463904d5dba1b2e29393e3864880e68218387ce5020b8dc5759e2038597653ef2a10e8f57b86361dd4c79ae1b4c66a4a4bd12cff796e60d8cfb88a677cbf13c48ac47cf417360a0d14bde8b171a6faa4b45b5f508288b1c32e7fd984dd4f3d8081698c79439c2d82b617c23e82d5957f1501fdc95d41bfdcefcbba5eb043677f8b838fa3928972ccdb13ee8882dfdd2e77927bfbf6e9b2d5bd8a204ff9ee8b3cd990b6531614f9d2b922e87885f9869326ed2d88ef43f1cea58e9f5d5b3b226e91c6d6a5933b9c73b388f0116effd6dbad556bd648f879508f1a42922d1d2a49763392b5c7eea71c18ef53bec9cef6fae46149721a87355f0b139960e55fc78c", 0x1000, 0x1, 0x0, 0x2}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x2, 0x8, r5, &(0x7f0000000240)="273cfc21fa8fdef2aaac9ebc8bd837a52d2b1afb2b40f4f16280e91e0da3513f67b75e9b3d80956c908c88d74b7cea7b2f28d883ea54b1213b49505d3293da302c28f1179adc5efc6c142853babe3169a598fb666153f6ad0055bf923eea3ba17879d13de31759467ffd871e2154d661387c5bd0458f04414a51e90f986312a3992cd617b0aecf741d4c8b0f1ad5087314d53954611f9478237293f20f14270ec63ab6492583", 0xa6, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x5, 0x56ab, 0xffffffffffffffff, &(0x7f0000000340)="f6172439953406a91c40055a110b71d01fda274a305e3b0f745fcf926c00868edf4e7ae5f450f882236e01600940b8b411b1e5", 0x33, 0x101, 0x0, 0x1, r6}]) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r8, r9) ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0xd0) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) 14:41:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017be0) 14:41:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017be1) 14:41:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0xffffffffffffff23) r1 = gettid() wait4(r1, &(0x7f0000000040), 0x1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r4 = dup2(r2, r3) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0xfffffffe, @rand_addr="00ff00000900"}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCSETS(r4, 0x5402, &(0x7f00000000c0)={0x1, 0x5, 0x3, 0x3ff, 0x9, 0x6, 0x0, 0x2, 0x7, 0x7, 0xc973, 0x2}) r5 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r5, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:51 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455cb, 0x100000001) 14:41:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017be2) 14:41:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:52 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455cb, 0x100000001) 14:41:52 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000000)) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:41:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f00000000c0)=0x20002) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017be3) 14:41:52 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455cb, 0x100000001) 14:41:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100017be4) 14:41:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x17ffffff2) 14:41:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x17ffffff8) 14:41:53 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000000)) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:41:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x17ffffff9) 14:41:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x17ffffffc) 14:41:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="ee9e07f5", @ANYRES16=r5, @ANYBLOB='\x00'/14], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x8040) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r7, &(0x7f0000000340)=ANY=[], 0xff0e) close(r7) ioctl$int_in(r7, 0x5421, &(0x7f0000000080)=0x1) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x303}, "1f88b228b5c500", "52a8f3c9edd18e459572f1c59d2a86e8f5088c6b3768c865c200", "b611dfba", "907291487b859891"}, 0x38) splice(r6, 0x0, r7, 0x0, 0x100000000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r9, &(0x7f0000000340)=ANY=[], 0xff0e) close(r9) ioctl$int_in(r9, 0x5421, &(0x7f0000000080)=0x1) setsockopt$inet6_tcp_TLS_TX(r9, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x303}, "1f88b228b5c500", "52a8f3c9edd18e459572f1c59d2a86e8f5088c6b3768c865c200", "b611dfba", "907291487b859891"}, 0x38) splice(r8, 0x0, r9, 0x0, 0x100000000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r11, &(0x7f0000000340)=ANY=[], 0xff0e) close(r11) ioctl$int_in(r11, 0x5421, &(0x7f0000000080)=0x1) setsockopt$inet6_tcp_TLS_TX(r11, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x303}, "1f88b228b5c500", "52a8f3c9edd18e459572f1c59d2a86e8f5088c6b3768c865c200", "b611dfba", "907291487b859891"}, 0x38) splice(r10, 0x0, r11, 0x0, 0x100000000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TLS_TX(r13, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x303}, "1f88b228b5c500", "52a8f3c9edd18e459572f1c59d2a86e8f5088c6b3768c865c200", "b611dfba", "907291487b859891"}, 0x38) splice(r12, 0x0, r13, 0x0, 0x100000000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r15, &(0x7f0000000340)=ANY=[], 0xff0e) close(r15) ioctl$int_in(r15, 0x5421, &(0x7f0000000080)=0x1) setsockopt$inet6_tcp_TLS_TX(r15, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x303}, "1f88b228b5c500", "52a8f3c9edd18e459572f1c59d2a86e8f5088c6b3768c865c200", "b611dfba", "907291487b859891"}, 0x38) splice(r14, 0x0, r15, 0x0, 0x100000000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r17, &(0x7f0000000340)=ANY=[], 0xff0e) ioctl$int_in(r17, 0x5421, &(0x7f0000000080)=0x1) setsockopt$inet6_tcp_TLS_TX(r17, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x303}, "1f88b228b5c500", "52a8f3c9edd18e459572f1c59d2a86e8f5088c6b3768c865c200", "b611dfba", "907291487b859891"}, 0x38) splice(r16, 0x0, r17, 0x0, 0x100000000, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4030a03}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x6c, r5, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r7}, {0x8}, {0x8, 0x1, r9}, {0x8, 0x1, r11}]}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_SOCKETS={0xffffffffffffffb2, 0x7, [{0x8, 0x1, r16}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4048880}, 0x10) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x38, r5, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) 14:41:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:54 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000000)) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:41:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x80000001}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e21, 0x2df2, @empty, 0xf844}}, 0x100, 0x8}, &(0x7f0000000200)=0x90) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_buf(r2, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) r4 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000240)='logon\x00', &(0x7f00000002c0)={'\x00', 0x1}, &(0x7f0000000300)='\x00', r4) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r6 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='c', 0x300, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r6, 0xfffffffffffffffc, r5, 0x0) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='c', 0x300, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r8, 0xfffffffffffffffc, r7, 0x0) r9 = request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f0000000400)='syz', r7) keyctl$clear(0x7, r9) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x80000000002c00) 14:41:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:54 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000000)) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:41:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x11000, 0x0) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f00000000c0)={0x1f, 0x7f, 0x3}) 14:41:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 14:41:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455cb, 0x100000001) 14:41:55 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000000)) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:41:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455cb, 0x100000001) [ 659.726339][T21744] fuse: Bad value for 'fd' 14:41:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455cb, 0x100000001) [ 660.003298][T21756] fuse: Bad value for 'fd' 14:41:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x6, 0x28, 0x7, 0x3ff, 0x81, "84e6f5e8d85aad1046b988e3693961460c17af", 0x6, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = dup2(r1, r2) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0x6, &(0x7f0000005580)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, &(0x7f0000005640)=0xb0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000340)={r6, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x25}}}}, 0x84) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000000)={0x0, 0x0, 0xeaee6100425553c7, 0x1, {0xff, 0x1ff, 0xf1, 0x1}}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x13) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000300)={0x80fb, 0x1}) r7 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r7, &(0x7f00000000c0)={0x14c}, 0x137) r8 = accept4$unix(r3, 0x0, &(0x7f0000000280), 0x1000) fsync(r8) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r7, 0xc0086423, &(0x7f0000000100)={r9, 0x2}) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f0000000240)={r9, 0x2, &(0x7f0000000140)=[0x6000, 0x8e], &(0x7f0000000180)=[0x8, 0x4, 0x4, 0x4, 0x800, 0x8, 0x4], 0x2, 0x2, 0x5, &(0x7f00000001c0)=[0x4, 0x20], &(0x7f0000000200)=[0x3]}) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:41:56 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x0) 14:41:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x80240, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x203000, 0x0) dup2(r2, r3) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r3, &(0x7f00000000c0)="a096809c55ba5a62882c5cc23aafb33aa563833e7dd645a73554a9ec26c03dda199b771d1a1009e9c9f571f81c4462aafff64064510229d1a3c2f63eec8f2e40fe95df12befecbfbbf5c1774990bd1d8b17d637df43f7303d4120a1ad2d113773daa067949937d94903b09f2fb4c8c3a018d641595b55ecc0e2e7380482dddc0af63b4619f6866faf8b6557c04f918c9dc6f2c866d352356a438f761273919a39286394f76a8a2951fd83581f4b8797574301144bc5a963b2d2c61136f967e3cb0321d297b824644ba324a721f2745e04d2372", &(0x7f0000000040)=""/60, 0x8}, 0x20) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000240)={0x73c, 0x3, 0x1000}, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:56 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000000)) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:41:56 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x0) [ 660.412553][T21834] fuse: Bad value for 'fd' 14:41:56 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x0) 14:41:56 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000002400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/de\x99\xf6K`mx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:41:56 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:57 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000000)) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:41:57 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x9, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r1, r2) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000000)={0x2, 0xde55, 0x4, 0x0, 0x621d, 0xffff}) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 14:41:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000003c0)=0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="b544c7203962250be91a715283b97a601ce4b627f3503b575761a63764d8726e20bf12980fd18495a0ec9abb4ddd0fc2617c3325e2a030c6e8f53b8cb1c144010abbdad739a1580baa52b30d5886fc38560b68860f56251d37658984a2ce2256a6fee2bfb0cac4e24b5c1c855d4ba0e82d1e749f6c", 0x75, 0x6}, {&(0x7f00000001c0)="a77159", 0x3, 0x101}, {&(0x7f00000002c0)="1582234d0d63435de8fb7320de08fead542bd75e2eacce579ff2b6bca594505fb4f127744ad79f55581bff0a7394a94182d19330563d89527e7528295f63cfd614090c205d01ce4ec56f1e8f194bf77b90707941664f16ab80241f0508cc5b5a364aea5aabc6c38e99a7652cb1bd46e5f13b0c0bcfd605ca7abf3467f0d8baf606883d984ce378fb704749f448c87a3d6752a413f2f2fc9efd56ad4044228cdaf37968600d10c92663212ff3468b5d3ee6d0b466fded3206c672f324cb55341a8b9f1636cb6200f6b138ce4fa9563b4f1efbc34226ff5e0461fd39f2df4f773a3c1af06ed71a7ee7", 0xe8, 0x6}], 0x1005, &(0x7f0000000400)={[{@inline_xattr_size={'inline_xattr_size', 0x3d, 0x2}}], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '$security'}}, {@fowner_lt={'fowner<', r0}}]}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r4, r5) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, 0x0, 0x33d) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x22, &(0x7f0000000040)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r6, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 14:41:57 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 661.321302][T21942] debugfs: Directory 'hci0' with parent 'bluetooth' already present! 14:41:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b7020000023f0000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x684842) setsockopt$inet6_buf(r2, 0x29, 0x22, &(0x7f0000000000)="3939338da8282d1a9d32507523c2db84", 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80000, 0x0) ioctl$TIOCMSET(r4, 0x5418, &(0x7f00000000c0)=0x5) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) ptrace$cont(0x74f2321018cabba, r3, 0x3df, 0x8) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 14:41:57 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 661.638996][ T33] Bluetooth: Error in BCSP hdr checksum 14:41:57 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000200)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:57 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001001700000100cd"]}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) dup2(r2, r3) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000000)) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:41:57 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:41:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x87) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b70200000340e420bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff070000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c729afc51fc821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c1dc908abb6e73280c1952bff000076fd28dff1a15750ab9a78fc1c703aaa247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8eb040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb2e4dd4a55eb6b87b4963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b781ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb30a5bb8c13d5b47975b4b13b9f35e4f41a62df9b4c03e53466fac6b76c12aadd308fc0c1ffffffffffffffc19f958e8b34de35949a0300ce18799ee53da177a81ea65e652c1d71b7ee86a75bb3bb1c757f7169f006f3f5c95177fbd0b14b3625962905ef911785c8cc0c4a11cb136d8a6085d676d8ef8aa6b98d57d6dac5e752efb59e16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 14:41:58 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000200)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:41:58 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 663.407795][ T12] Bluetooth: hci0: command 0x1003 tx timeout [ 663.414067][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 665.487875][T16580] Bluetooth: hci0: command 0x1001 tx timeout [ 665.494056][ T1531] Bluetooth: hci0: sending frame failed (-49) [ 667.567917][ T12] Bluetooth: hci0: command 0x1009 tx timeout [ 671.650669][T21909] ================================================================== [ 671.659295][T21909] BUG: KASAN: use-after-free in kfree_skb+0x2a/0xb0 [ 671.665927][T21909] Read of size 4 at addr ffff88809632ec14 by task syz-executor.5/21909 [ 671.674194][T21909] [ 671.676521][T21909] CPU: 0 PID: 21909 Comm: syz-executor.5 Not tainted 5.4.0-rc8 #0 [ 671.684309][T21909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.694349][T21909] Call Trace: [ 671.697624][T21909] dump_stack+0x1fb/0x318 [ 671.701943][T21909] print_address_description+0x75/0x5c0 [ 671.707470][T21909] ? vprintk_func+0x158/0x170 [ 671.712229][T21909] ? printk+0x62/0x8d [ 671.716199][T21909] ? vprintk_emit+0x2d4/0x3a0 [ 671.721123][T21909] __kasan_report+0x14b/0x1c0 [ 671.725779][T21909] ? _raw_spin_unlock+0x40/0x50 [ 671.730612][T21909] ? kfree_skb+0x2a/0xb0 [ 671.734865][T21909] kasan_report+0x26/0x50 [ 671.739220][T21909] check_memory_region+0x2cf/0x2e0 [ 671.744332][T21909] __kasan_check_read+0x11/0x20 [ 671.749166][T21909] kfree_skb+0x2a/0xb0 [ 671.754024][T21909] bcsp_close+0xb1/0xf0 [ 671.758158][T21909] hci_uart_tty_close+0x201/0x240 [ 671.763159][T21909] ? hci_uart_tty_open+0x340/0x340 [ 671.768257][T21909] tty_ldisc_close+0x126/0x180 [ 671.773024][T21909] tty_ldisc_release+0x248/0x5a0 [ 671.777942][T21909] tty_release_struct+0x2a/0xe0 [ 671.782769][T21909] tty_release+0xce9/0xfa0 [ 671.787164][T21909] ? tty_release_struct+0xe0/0xe0 [ 671.792178][T21909] __fput+0x2e4/0x740 [ 671.796150][T21909] ____fput+0x15/0x20 [ 671.800111][T21909] task_work_run+0x17e/0x1b0 [ 671.804679][T21909] prepare_exit_to_usermode+0x459/0x580 [ 671.810228][T21909] syscall_return_slowpath+0x113/0x4a0 [ 671.815699][T21909] do_syscall_64+0x11f/0x1c0 [ 671.820271][T21909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.826138][T21909] RIP: 0033:0x4141d1 [ 671.830018][T21909] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 671.849798][T21909] RSP: 002b:00007ffd0bfcec00 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 671.858303][T21909] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004141d1 [ 671.866255][T21909] RDX: 0000001b2be20000 RSI: 0000000000000000 RDI: 0000000000000003 [ 671.874207][T21909] RBP: 0000000000000001 R08: 000000006ab1b76c R09: 000000006ab1b770 [ 671.882157][T21909] R10: 00007ffd0bfcece0 R11: 0000000000000293 R12: 000000000075c9a0 [ 671.890119][T21909] R13: 000000000075c9a0 R14: 0000000000760750 R15: 000000000075bfd4 [ 671.898089][T21909] [ 671.900408][T21909] Allocated by task 33: [ 671.904546][T21909] __kasan_kmalloc+0x11c/0x1b0 [ 671.909295][T21909] kasan_slab_alloc+0xf/0x20 [ 671.913911][T21909] kmem_cache_alloc_node+0x235/0x280 [ 671.919177][T21909] __alloc_skb+0x9f/0x500 [ 671.923496][T21909] bcsp_recv+0x12e7/0x1720 [ 671.927896][T21909] hci_uart_tty_receive+0x16b/0x470 [ 671.933080][T21909] tty_ldisc_receive_buf+0x12e/0x170 [ 671.938343][T21909] tty_port_default_receive_buf+0x82/0xb0 [ 671.944771][T21909] flush_to_ldisc+0x328/0x550 [ 671.949430][T21909] process_one_work+0x7ef/0x10e0 [ 671.954355][T21909] worker_thread+0xc01/0x1630 [ 671.959010][T21909] kthread+0x332/0x350 [ 671.963071][T21909] ret_from_fork+0x24/0x30 [ 671.967472][T21909] [ 671.969784][T21909] Freed by task 33: [ 671.973595][T21909] __kasan_slab_free+0x12a/0x1e0 [ 671.978529][T21909] kasan_slab_free+0xe/0x10 [ 671.983007][T21909] kmem_cache_free+0x81/0xf0 [ 671.987572][T21909] __kfree_skb+0x118/0x170 [ 671.991980][T21909] kfree_skb+0x6f/0xb0 [ 671.996035][T21909] bcsp_recv+0x99c/0x1720 [ 672.000343][T21909] hci_uart_tty_receive+0x16b/0x470 [ 672.005551][T21909] tty_ldisc_receive_buf+0x12e/0x170 [ 672.010816][T21909] tty_port_default_receive_buf+0x82/0xb0 [ 672.016538][T21909] flush_to_ldisc+0x328/0x550 [ 672.021194][T21909] process_one_work+0x7ef/0x10e0 [ 672.026105][T21909] worker_thread+0xc01/0x1630 [ 672.030853][T21909] kthread+0x332/0x350 [ 672.034925][T21909] ret_from_fork+0x24/0x30 [ 672.039312][T21909] [ 672.041615][T21909] The buggy address belongs to the object at ffff88809632eb40 [ 672.041615][T21909] which belongs to the cache skbuff_head_cache of size 224 [ 672.056173][T21909] The buggy address is located 212 bytes inside of [ 672.056173][T21909] 224-byte region [ffff88809632eb40, ffff88809632ec20) [ 672.069447][T21909] The buggy address belongs to the page: [ 672.075087][T21909] page:ffffea000258cb80 refcount:1 mapcount:0 mapping:ffff88821b6b1c40 index:0xffff88809632ea00 [ 672.085477][T21909] raw: 01fffc0000000200 ffffea0002674bc8 ffffea0002a6d008 ffff88821b6b1c40 [ 672.094057][T21909] raw: ffff88809632ea00 ffff88809632e000 0000000100000008 0000000000000000 [ 672.102620][T21909] page dumped because: kasan: bad access detected [ 672.109010][T21909] [ 672.111330][T21909] Memory state around the buggy address: [ 672.116963][T21909] ffff88809632eb00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 672.125029][T21909] ffff88809632eb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 672.133095][T21909] >ffff88809632ec00: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 672.141136][T21909] ^ [ 672.145700][T21909] ffff88809632ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 672.153964][T21909] ffff88809632ed00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 672.162004][T21909] ================================================================== [ 672.170649][T21909] Disabling lock debugging due to kernel taint [ 672.177657][T21909] Kernel panic - not syncing: panic_on_warn set ... [ 672.184428][T21909] CPU: 1 PID: 21909 Comm: syz-executor.5 Tainted: G B 5.4.0-rc8 #0 [ 672.193598][T21909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.204026][T21909] Call Trace: [ 672.207307][T21909] dump_stack+0x1fb/0x318 [ 672.211643][T21909] panic+0x264/0x7a9 [ 672.215513][T21909] ? __kasan_report+0x195/0x1c0 [ 672.220336][T21909] ? trace_hardirqs_on+0x34/0x80 [ 672.225246][T21909] ? __kasan_report+0x195/0x1c0 [ 672.230071][T21909] __kasan_report+0x1bb/0x1c0 [ 672.234722][T21909] ? _raw_spin_unlock+0x40/0x50 [ 672.239545][T21909] ? kfree_skb+0x2a/0xb0 [ 672.244036][T21909] kasan_report+0x26/0x50 [ 672.248343][T21909] check_memory_region+0x2cf/0x2e0 [ 672.253614][T21909] __kasan_check_read+0x11/0x20 [ 672.258454][T21909] kfree_skb+0x2a/0xb0 [ 672.262500][T21909] bcsp_close+0xb1/0xf0 [ 672.266639][T21909] hci_uart_tty_close+0x201/0x240 [ 672.271659][T21909] ? hci_uart_tty_open+0x340/0x340 [ 672.276835][T21909] tty_ldisc_close+0x126/0x180 [ 672.281576][T21909] tty_ldisc_release+0x248/0x5a0 [ 672.286500][T21909] tty_release_struct+0x2a/0xe0 [ 672.291329][T21909] tty_release+0xce9/0xfa0 [ 672.295720][T21909] ? tty_release_struct+0xe0/0xe0 [ 672.300716][T21909] __fput+0x2e4/0x740 [ 672.304674][T21909] ____fput+0x15/0x20 [ 672.308643][T21909] task_work_run+0x17e/0x1b0 [ 672.313342][T21909] prepare_exit_to_usermode+0x459/0x580 [ 672.318894][T21909] syscall_return_slowpath+0x113/0x4a0 [ 672.324348][T21909] do_syscall_64+0x11f/0x1c0 [ 672.328917][T21909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.334782][T21909] RIP: 0033:0x4141d1 [ 672.338668][T21909] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 672.358263][T21909] RSP: 002b:00007ffd0bfcec00 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 672.366647][T21909] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004141d1 [ 672.374592][T21909] RDX: 0000001b2be20000 RSI: 0000000000000000 RDI: 0000000000000003 [ 672.382640][T21909] RBP: 0000000000000001 R08: 000000006ab1b76c R09: 000000006ab1b770 [ 672.390601][T21909] R10: 00007ffd0bfcece0 R11: 0000000000000293 R12: 000000000075c9a0 [ 672.398547][T21909] R13: 000000000075c9a0 R14: 0000000000760750 R15: 000000000075bfd4 [ 672.408191][T21909] Kernel Offset: disabled [ 672.412534][T21909] Rebooting in 86400 seconds..