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", 0x1000}, {&(0x7f0000001700)="bc8fe3f12e5bc352611d17c726aaea4479ffd6d1455328daecab7fc478284df1018028154315b49fb2714a70c7ed20452ab23725f3b7af7e5927a53411566a4996911c7daa77b2b9c3473b700bd3f5ac0c2c151aeea8765034b5eb49ff81b71eff27b4e3db109af7047de20d6ab394e49ada4aabe94d6596411b349f4ed42697e2b67c9ec6b0dde60d1c630ab6d898a06ddb3294e4db459a7b005b780f", 0x9d}, {&(0x7f00000017c0)="35ae740c6e4f190beb523188cb7005f88870f369299a716463d68feea49c6d4221c63fdfdf5b309a526968fa3eaa33daf32e1d9192313b94a890774402f1e7394d5b259fe34b10f4005a9c159635acdd71c29b5de5f4cadb03783b7094d226351df2240f46ca0994843180c7c921109e282fc518cd04de458d8b1e75a24d7aae82c9c77ae9b3cc30ca74fdccd58ddb74f7f6f5581952fd54b684ad2e3df71492a45b229c11d48faf518bc94da1ee4b537bc062b76919d618925f6dd59160e3ce0a05b26fe217879b8e246f657043dd1d5425894e697d69c11b0708b9c01c52d1b5b3", 0xe2}, {&(0x7f00000018c0)="bd663dd34fa06ae5dc522dcf03fc1a0d6c3a", 0x12}, {&(0x7f0000001900)="7a95378b46105ab755b268273dae3ff1a92a18ced509e207203e616ed64e3c82f647cd7c61c814dea4acb4bfe9fe7dcc694f89aa847fc4dcae5cbc864fc8c5fa9a1895e6b68c6d73c2d4019526003b311d085d592789f3798e2fb94c8b90ec306c14e84e2f75a5ce04a7d7779d2a4f7dc68bba1c6756fe12351ba4dfdcc935ba7f9c0f30a577f9eeb726be0bce6ccdc6e27431e7cfae1a8e76524116837e63e4eaeabead5e23c51598", 0xa9}, {&(0x7f00000019c0)="e9e6c1b287d8014f834e1332ae9c64ea4b1feb45982007998b07e35eb190132d6b3736aa2794807ba45dcde0d7f7c20bf173470ee8e88dbe35de9e7d3bcd641d1c1b326578cfa7e0627d83ecd8641dc13bbf647984b2c15025e9beec80a691bf26fd13b71a85682d38523d70d1", 0x6d}], 0x7, &(0x7f0000001ac0)=[@dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x11}}], 0x18}, {&(0x7f0000001b00)=@in={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000001e40)=[{&(0x7f0000001b40)="1ab26cb823af416635417a750c9a6c5de4290450f02d8723679f07a7b04730a10096aa2cc6853b5c3868", 0x2a}, {&(0x7f0000001b80)="d25877e21db83885ee47b8e599382e4149db0101df6c6a28285f891c3ef21476d47a2e339eb4bd46420a98a5167f4a57faa076fd440be56519201d093f2d599d520b84d900f9801f6b8ad0e660737d655249ed5ffc231bab2784a0403741f4676e7ecf516b0c61411737b436a9777f94f172f9c3541fcae1fb2a2726955b", 0x7e}, {&(0x7f0000001c00)="3cbce844dabe7568322cd594d555206272d3a0df93b6c6bb7206d9a688ea39ac718d4b2ec725a00ca4a0a920a3e9c068d7b95c818dace54cfb4258f0dfb45ae17a0696d390aaec89ed42fabae55379b9bd81e2d3d7507d4d3315b013c59b4c60582a7abb1d529576dc106a315b88e14666e9065fbe3bdc363ee2dbbc526fcfeef57092aac1c2fb9b8f1e6358a7e66b", 0x8f}, {&(0x7f0000001cc0)="fad96486b4e7b65c968a45ecee2b4759cd6b2ef615ada72366ca9aae9ac69c4029cdb649a4fccf770b68eb81df7efbdba81b4c683f8ca31496976ee6a529e2f7b44614e1cf4ee0309eeb074af4037d986b2588dd37137d83b27652e5d44338b489d1071b91e78e30a2eecf368a625e3fc0a6c851b1b1a944b59de89cd62e0ea0a0d22e996bd48cf8416e045ec20948338628b894", 0x94}, {&(0x7f0000001d80)="86388743edd584cc5c", 0x9}, {&(0x7f0000001dc0)="cebe2c1487ff5bb1b6162c9f0d6384150d2789a9c9232fe8a2c04c55c1147fbb1d6921688bbf36874a7196d5efe65aa37f30dfcbb7028877e25d8720bca4ff6ddea2ba5f9bfcead8ed4707447aa120", 0x4f}], 0x6, &(0x7f0000001ec0)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}], 0x18, 0x1}], 0x3, 0x881) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r8 = syz_open_dev$sndpcmc(&(0x7f0000001fc0)='/dev/snd/pcmC#D#c\x00', 0x8, 0x40) ioctl$CAPI_GET_ERRCODE(r8, 0x80024321, &(0x7f0000002000)) 01:14:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c679688fb9453124cb0", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xc2636014, @loopback}, 0x1c) 01:14:45 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$usbfs(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x2, 0x4000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="43ff01", @ANYRESHEX=r0, @ANYBLOB="10425663746d6f64653d3030303030303030303030303030303030c8e5316ac3d6d1cc7365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c67e26f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)="89a39294f213c463865f32b7b5771fcadc4b16d50ae54ad1d2e074a3fe12b8cdf1a69b4dffc3b263a3f0b764a4699b5b0f492be65cea0f61ac2c08891da617457614a933e360e532a97c7e2d067c07f592e1e507752046107197a78d4a586b5460130f4eca544cb7b9fa8824650cfeb96a4cbb08cc5935d5a1672e44d9bd99b5a69d134d377997a2e07f3b150b9e8359ab4e1a71d6802a43c7784fc4d48cf67ee2896114da0cc2a29e", 0xa9}, 0x68) 01:14:45 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U-', 0x1000}, 0x28, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="f022e64fe527dd88414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490db0554fabd304007b8310479eb37dc161fa6744b508aa8bdd39d7e36caf40f5485249652fa2bf35fd8f663b00abada61a7d5959bc850cc814f5799c42000001003cedf5432c673e093370f6034d18432a4c049a13c9c554536259f0cbae91955e08000000436e2128df4c24b90dc6d8d6f462cf4ef029667a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756fab6056a1cc7412fd854b0d268d8720020000ffffffff3b0000000000"], 0x200600) ioctl$int_in(r1, 0x5421, &(0x7f0000000240)=0x7) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$RTC_IRQP_READ(r3, 0x8008700b, &(0x7f00000001c0)) r4 = request_key(&(0x7f0000000200)='ceph\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000004c0)='-system\x00', 0xfffffffffffffff8) keyctl$clear(0x7, r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r5, 0x5421, &(0x7f0000000240)=0x7) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000100)=0x10001, 0x4) setsockopt$CAN_RAW_FD_FRAMES(r2, 0x65, 0x5, &(0x7f0000000040)=0xfffffffe, 0x4) write$P9_RMKDIR(r0, 0x0, 0x0) 01:14:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xc2ffffff, @loopback}, 0x1c) [ 506.380903][T21509] fuse: Unknown parameter 'gro' [ 506.390492][T21512] fuse: Unknown parameter 'C0x0000000000000003BVctmode' 01:14:45 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x0, @random="81b3c02869ba", 'veth1_to_team\x00'}}, 0x1e) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) [ 506.438091][T21512] fuse: Unknown parameter 'C0x0000000000000003BVctmode' [ 506.457592][T21514] fuse: Unknown parameter 'gSL00000000000000000000' 01:14:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xc4ffffff, @loopback}, 0x1c) [ 506.529684][T21525] fuse: Unknown parameter 'gro' [ 506.537359][T21514] fuse: Unknown parameter 'gSL00000000000000000000' 01:14:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r0, 0x5421, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) ptrace(0x10, r1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f6465f530303030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) inotify_init() r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000180)=@int=0xf6c, 0x4) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) inotify_add_watch(r3, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) write$P9_RLOPEN(r4, &(0x7f0000000100)={0x18, 0xd, 0x2, {{0xaa, 0x0, 0x4}, 0x1000}}, 0x18) 01:14:45 executing program 2: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000040)={0x20, 0x5, 0x2}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="340ffd2c1cbc974ae5f9", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = inotify_init() r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x10600, 0x0) write$P9_RSTAT(r3, &(0x7f0000000140)={0x62, 0x7d, 0x2, {0x0, 0x5b, 0x7fff, 0x6, {0x5, 0x3, 0x1}, 0x0, 0x2, 0x3ff, 0x2, 0xa, '/dev/fuse\x00', 0xa, '/dev/fuse\x00', 0xa, '/dev/fuse\x00', 0xa, '/dev/fuse\x00'}}, 0x62) inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 506.782041][T21546] fuse: Bad value for 'user_id' [ 506.817233][T21549] fuse: Bad value for 'user_id' [ 506.829129][T21550] fuse: Unknown parameter 'rootmode00000000000000000040000' [ 506.919237][T21552] fuse: Unknown parameter 'rootmode00000000000000000040000' 01:14:46 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d7b625582f90c3e06e2362d4f48e255098910e227e4b9000000002a884ed317128a63490e381a8b23988fd1ddac2fa8ba87dd8079a4ede96fd7be8ef13e959dc9b9fb1f3c7b2852fbee5017d29d3f91229395a51fd6450c03b7f5e6d8f86197b5abea26bcb08eda144ecba15f8cbdcfc31e28259a098a16b0181e1d17fdc9f8bb9a238468933580dc0582e6e34ccc26256931d51659934af44a72c9851f478f4ce17d080ba9519c3eaf7e72d156056f5d03e901829632", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xd61fdf1c, @loopback}, 0x1c) 01:14:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x240}, 0x1c) 01:14:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=""/127, 0x7f) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) openat$cgroup_type(r2, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="c1b15e063c805851dc3798000d9918dc0461b205a80806e32f5095c626375798886038c1c71d487e54d8f9199a1554f4c75fcd4bebfe1f", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:46 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) openat$cgroup_ro(r1, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) [ 507.299259][T21564] fuse: Bad value for 'user_id' [ 507.318851][T21567] fuse: Bad value for 'group_id' 01:14:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xd80d0000, @loopback}, 0x1c) [ 507.371775][T21573] fuse: Bad value for 'group_id' 01:14:46 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 507.415593][T21564] fuse: Bad value for 'user_id' 01:14:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x191100, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x9}, 0x28, 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000100)={0x60, 0x0, 0x1, {{0x64a, 0x5, 0x0, 0x1, 0x100000000, 0x1, 0xfffffffe, 0x7}}}, 0x60) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xdc7f0000, @loopback}, 0x1c) 01:14:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000000)={0x2, [0x0, 0x0]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="03894c4bd968dbb30404cac8a7462a9de8d5ccee9f7fce788107ff13b4d0e6f77ed4550fe97c4ed463376d7f1d993c5b6c59d764f7eb4d312f309a6f6db15f632a876386f7a5cbee49a9b750", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) inotify_init() umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:46 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet6_dccp_int(r0, 0x21, 0x5, &(0x7f0000000180), &(0x7f0000000240)=0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) mount$fuse(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'uSer_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@euid_eq={'euid', 0x3d, r3}}]}}) inotify_init() umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 507.628218][ C1] net_ratelimit: 23 callbacks suppressed [ 507.628229][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:14:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xe00d0000, @loopback}, 0x1c) [ 507.735898][T21597] fuse: Unknown parameter 'LKh۳ȧF*x~U|Nc7m<[lYdM1/0om_c*cIP0x0000000000000004' 01:14:46 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 507.804548][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 507.845273][T21605] fuse: Unknown parameter 'LKh۳ȧF*x~U|Nc7m<[lYdM1/0om_c*cIP0x0000000000000004' 01:14:47 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 01:14:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xe02e0000, @loopback}, 0x1c) 01:14:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bind$packet(r1, &(0x7f0000000340)={0x11, 0x15, r3, 0x1, 0x8, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r4, 0x5421, &(0x7f0000000240)=0x7) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f0000000000)) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x2001010, &(0x7f00000006c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303147707a40629ddb61022b0ab20330303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',obj_user=group_id,smackfsfloor=\f+,fowner>', @ANYRESDEC=0xee00, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB=',subj_user=\'}*vmnet1%cpuset,defcontext=staff_u,\x00']) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) write$FUSE_INIT(r2, &(0x7f0000000240)={0x50, 0x0, 0x5, {0x7, 0x1f, 0x80000000, 0x2000204, 0x1f, 0x9, 0x1, 0x8}}, 0x50) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x80, 0xffff, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) acct(&(0x7f0000000100)='./file0\x00') 01:14:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x300}, 0x1c) 01:14:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) socketpair(0x11, 0x800, 0x5, &(0x7f0000000040)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) ioctl$USBDEVFS_GET_CAPABILITIES(r2, 0x8004551a, &(0x7f0000000100)) bind(r1, &(0x7f0000000080)=@in6={0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0x2a}}, 0x80) getegid() write$P9_RMKDIR(r0, 0x0, 0x0) [ 508.130959][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:14:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="495404fc3834b17bb11703c92c00000000"]) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 508.252964][T21624] fuse: Unknown parameter '[roup_id' [ 508.257247][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 508.291795][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:14:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xe8030000, @loopback}, 0x1c) 01:14:47 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="629ac1cf4b5b48118e979471cd042419ffb5d85c471660e5fb9d641343e3896955fe53b99ce3ec8ee60b2fea8465eb5e21f1b0a768714b59d96247ce44447976f2f168975b11f78bda4a0db887b6ca313511ddd51ae297c1c924416fe4a4c9f7589a29efbb303d2bd4d25c9a1c14cdd3cb0fb2b2e5a3cb02fb4c2e5069e71bc52f91f3388e2e804f0fc80b7cf988cae94709afd2cabc88", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000003c0)=0xfffffffffffffdd9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000002c0)=0x0, &(0x7f0000000340), &(0x7f0000000380)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f00000005c0)={{}, {0x1, 0x1}, [{0x2, 0x1, r1}, {0x2, 0x0, r2}, {0x2, 0xf}, {0x2, 0x3, r4}, {0x2, 0x1, r5}, {0x2, 0x1, 0xee00}], {0x4, 0x2}, [{0x8, 0x4, r6}], {0x10, 0x1}, {0x20, 0xa}}, 0x5c, 0x1) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000480)='./file0\x00', 0x2000045) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 508.335868][T21633] fuse: Unknown parameter '[roup_id' [ 508.428262][T21636] fuse: Bad value for 'group_id' [ 508.435138][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:14:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xef011080, @loopback}, 0x1c) 01:14:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r0, 0x5421, &(0x7f0000000240)=0x7) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000140)={r1, 0x48, "670cae86eefbbe678406264ff6e61347ff5da5166d0ad3d4ea19ed4059f44913222c4414c6c90590d3817684ebf9ddf19a1cad9bc2ca03748cfec2e19a2dfa7eed92372a48ced3e2"}, &(0x7f0000000240)=0x50) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) [ 508.509583][T21642] fuse: Unknown parameter 'bK[Hq$\G`dCiUS /e^!hqKYbGDDyvh[J 15$AoX)0' [ 508.544366][T21636] fuse: Bad value for 'group_id' [ 508.550756][T21647] fuse: Unknown parameter 'bK[Hq$\G`dCiUS /e^!hqKYbGDDyvh[J 15$AoX)0' [ 508.577959][T21648] fuse: Unknown parameter 'e' 01:14:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="66e43d7b89f4eeb3580954623d7fae74b144eb5bfe2b1338e558a937cd913fee09f6dda157b1006fa9f91909f03d306aaea27f7004b0aade017b43c03c584030f05fa635354dbac2274d436b5e8bd6e903b7a35040997259bb682dbc6dcf9976935739521e9b540818c78fa636a2b226b863427e2b664a9e6a9680af98c9a76a01dbf20127f4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="583db82bab186f97174aa50b96a1b5bca832eaff76ee88e903d4cb1af11bf42e2f24f7ef1a4163de494733b9481ef83f7d1a9054a5c48a7ff8453f20dba4d6fa2fcc06fa4ce9c0e9d9b220bfbe6b46cd95f47dad97b5eeff343f6ad94f28ed050f5bc42f408223da5e6b325e7748f9b5e3f5981eb865e675d3d344f8eed9f32562cb474419e4c088f933f2d5fa5600", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000000)=0xffffffe1, &(0x7f0000000100)=0x4) umount2(&(0x7f00000000c0)='./file0\x00', 0x7) [ 508.621409][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:14:47 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1fe0f054fa9fadbe, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x9, 0x3, 0x318, 0x110, 0x0, 0x0, 0x110, 0x0, 0x248, 0x248, 0x248, 0x248, 0x248, 0x3, &(0x7f0000000040), {[{{@ipv6={@empty, @rand_addr="cfcb3fdf5bfb4d9132d6cb105f87062e", [0xff, 0xff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0xff, 0xff000000], 'rose0\x00', 'bond0\x00', {0xff}, {0xff}, 0x24, 0x80, 0x0, 0x32}, 0x0, 0xf0, 0x110, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x8, 0x10}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@mcast1, @rand_addr="47f2afb50dfb0711da8360094d8cd130", [0x0, 0xffffff00, 0xffffff00, 0x27b220e7a929ca5a], [0xffffffff, 0xff000080, 0xffffffff, 0x7f800000], 'nr0\x00', 'vlan0\x00', {}, {}, 0x87, 0x7, 0x1, 0x20}, 0x0, 0x118, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030357f723d4933e660aed2eb862f302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',max_read=0x0000000000000001,default_permissions,\x00']) inotify_init() r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x38000304) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xf4010000, @loopback}, 0x1c) [ 508.674132][T21654] fuse: Unknown parameter 'e' [ 508.769311][T21657] fuse: Unknown parameter 'f' 01:14:47 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x9) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 508.793252][T21657] fuse: Unknown parameter 'f' [ 508.797651][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 508.813569][T21662] fuse: Bad value for 'rootmode' [ 508.849325][T21662] fuse: Bad value for 'rootmode' 01:14:47 executing program 0: msgget$private(0x0, 0x205) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="6660ff", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643ddfa8db3ced3788711ecbe1480538635323026e5c75a3960f05af1843f5902608b8263dec21bc6d3c548139382378080c818ba3d8e55c297f28a26a1423c00a1bdf4c23a2c10d80bb41901272d8a55221e3ff58c9a2a471dce8ed6cccf8725fc073f067c7e3443517f3d50438eef1cb3d383dca467ccb81f7691c60b25a3cee0b886d58e537a10a8c204400b440b6ead999bd2678ed17a903387e83fc3d5371aa16c0e228bd1205bc5ab304e2e1445e35", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400, 0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000600)={0xaa, 0x20}) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f0000000100)=@bcast) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000640)={[], 0x4, 0x7c, 0x0, 0x0, 0x3, 0x5000, 0x4000, [], 0x6}) getcwd(&(0x7f0000000400)=""/46, 0x2e) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000800)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca20107844ea0fa063de7c233e8dd903c754b334ab8e9117313dd82cb14d86e3f96f17dd98601d5905b17852cb4d23a28352f8741bbcc9c3886fe706630ad2b25ccbfe676c9d1a06f6f3dd35b4caaff71da65b79b97222adee7fb3af86b3fcd985b4816dfa84017ab22a6d04d041f4226e7fa07be7f89be0d21255060100000014f084cab46bd9b28e41ef9a9fdbf298fe0f1bf41685cf34bfb21ece0586836abbf5193fe426553251a8d8bcb9de7dc7781d13577a0b594f7769f18e95e8ba9408169eca1915370f7f"], 0x200600) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x7) getpeername$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) sendmsg$xdp(r1, &(0x7f00000005c0)={&(0x7f0000000280)={0x2c, 0xc, r4, 0x2a}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000340)="9c226c7e7a060de4a6db41ed0f50ab36413e8c3fba9916dfd7caff21d080970b2a768c46c04abe7c5851b4f947829864080ca1c0a45f787a2bb0d5e1ff14cacad525601f9f1033b7fe1e12b2ddf4ca1eeba3a63e72d3417f4eadb7e4f68a13abc0e1819762fd50910bd50aa9109d7ab5728dce0b7728a161c62681a5ed2fc531b9705d87032434c1566067cff73f5a6e8e74c7c417a6d324ab", 0x99}, {&(0x7f00000004c0)="8bc5892f1efdba363b38c7823705f8728243fdc9a65c8206d45e1829991f3249140b6c9ca9dc3a1ff8b667aaa09411aadb43e314dfc4ecf5ace2090566f7ab499ebf6395211fa855ee0cc8ffd4aafd20bbc62fed72f9663c95003fd1d12c2b76d48e1934679602621e48b00eb4e5c289b28ad871be4cb8663135582cc2a27673647e9533ae42071be5f20a9ad8ea8cdd40f36654a1718d8e2f6db145391f82a5c579b67e47520dd46f6858e318f4847fceec16da6c063a7a6015dd2538c51b1d599a00b5962ec506640820d1e0b041d46e0667dec7cd30390c371387fe94f96d013ad3e5f6", 0xe5}], 0x2, 0x0, 0x0, 0x40000}, 0x40) [ 509.016930][T21674] fuse: Unknown parameter 'f`0x0000000000000004' [ 509.072787][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:14:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x3e8}, 0x1c) 01:14:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xf5ffffff, @loopback}, 0x1c) 01:14:48 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x6000, &(0x7f0000000100)={[{@xino_auto='xino=auto'}, {@index_on='index=on'}, {@xino_off='xino=off'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '-*!-!'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r1, 0x5421, &(0x7f0000000240)=0x7) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) 01:14:48 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioprio_get$uid(0x5, r2) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) [ 509.113725][T21680] fuse: Unknown parameter 'f`0x0000000000000004' [ 509.220922][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:14:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xfc000000, @loopback}, 0x1c) 01:14:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000340)='/dev/vbi#\x00', 0x3, 0x2) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000000380)='/dev/snapshot\x00', &(0x7f00000003c0)='$\x00', 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000000)=0x1, 0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="1708000000000000003dd438b9103221266df802ac1f64b161612ea4f5e978a1442bdf197a5612dc54e76ddfaecb7e7be77f8b1d358dfb992cd1f8bf5c3c8f1ea68d4d15c686", @ANYRESDEC=0x0, @ANYBLOB="0400"]) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000400)='./file0\x00', 0x4000000) pipe(&(0x7f0000000240)={0xffffffffffffffff}) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000280)=0x2, 0x4) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r5, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f00000002c0)={0x40, 0x2, 0x3}, 0x10) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:48 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket(0xa, 0x0, 0x1) connect$netrom(r2, &(0x7f0000000000)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 01:14:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xfe800000, @loopback}, 0x1c) [ 509.413986][T21702] fuse: Unknown parameter 'd' 01:14:48 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000480)={{0x10b, 0x4, 0x8, 0x329, 0xbb, 0xfc, 0xf4, 0x3}, "672dc90aec6e6a65f04a8961f062a120ea88361756eb6589b45cdb88299d5c5559137d76ba527dbdaeb69b263016504a99c7ebcaa00dd9b51d385a520470af6ffb90a65b8f8bdfb4d8e37777dcb15643e4ba167bb17d6635efdac09457d64d3b605cc6feb110e33ea523a5cd0d154def9d3840aa73b868db772f", [[], [], []]}, 0x39a) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = socket(0x1, 0x100b, 0x6) sendmsg$rds(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/71, 0x47}], 0x1, &(0x7f0000000180), 0x0, 0x20000081}, 0x400d0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 509.545319][T21710] fuse: Unknown parameter 'd' 01:14:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xfec00000, @loopback}, 0x1c) 01:14:48 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="ff726f6f743030301030643d00ddff800000001600000000080000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x3, 0xf, 0x4, "12425b1c9c8f63dac2424100be191d20bbf6529b0ae3bf0f9b179300f59304f56acb8d28ad4e7982fe4008bf78aaea79b0c39d05b9d956b16d1cca16a2d912f9", "a53cdbfeac5a3842e23246756817b8e2b16f3876b351b453d28bff49f2806eb6e66891cd0e5dd4a06804c2ba2e39c5c1d712c353d8ecacc8f915a1f1a0f75623", "20a84a71c43f3bfbe971aba2c0dae13d4791db3feee40fd4723107459f13a90f", [0xffffffffffffffff, 0x5]}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r3, 0xc0845657, &(0x7f0000000100)={0x0, @reserved}) [ 509.797614][T21728] fuse: Bad value for 'fd' [ 509.817395][T21728] QAT: Invalid ioctl [ 509.874675][T21731] fuse: Bad value for 'fd' [ 509.885302][T21731] QAT: Invalid ioctl 01:14:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x500}, 0x1c) 01:14:49 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x40) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000004c0)=""/4096, &(0x7f0000000040)=0x1000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/d\xe5v/f\tse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:49 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRES32=r2, @ANYRES64=r0, @ANYPTR], @ANYRES16=0x0, @ANYRESDEC=0x0, @ANYBLOB="2c04726f75705f69643d", @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16, @ANYRES64=r0]], @ANYRESDEC, @ANYPTR], @ANYBLOB="2c00f666831fc3c6c6a4ec0f5d5936fbdf83758c221f9ad70bfc5c34b3999f9a6a1393941796ae84caa9e9be4c3ce7e83d07d67deeac6810de7065e2b54246bb07405af4609d8e190530f55a0f25921ccd084ffb98101e0c72acf2300941ad8f8c3d83b013dcc4604d8a2308e65c97fc94ef0565583b63da064da8168320d01800c4d849fe41022fa8920b4c35a61a4fcc5354641bfa29e212e9b7d01b1fe7d9f0"]) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400000, 0x0) ioctl$RTC_PLL_GET(r3, 0x80207011, &(0x7f0000000100)) 01:14:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xff000000, @loopback}, 0x1c) 01:14:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_SECUREBITS(0x1b) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="43afcf57523d00"/21, @ANYRESDEC=0x0, @ANYBLOB="2c00a30115be079ab804ce0b81d2d39b6ff85fad8d40d961b4104f8914fc84f62a4a8a3df8ef2169ad0355b4986fd8b29aa3c05a7a04b822e789f4839ffedf8c1dc52d3294d8a7aa731b64fda39633b198fbf8a7574ab81dad4d8fdbb8100e71020ee43357e322bfb0b017f2ae7dfedf169d4c34bc9ef82c821fe60cce1a0840faad13a7a673ff9afe57ecf9f8c6be27620634539bb9ee69025957680b57f74483b4abf50c487ff08ed17a2aa4fef947d8327cb758d56d2c97463de7eaaa3f842acc96e64d4dc9ae7917a2ae5ddc5166c24e85f136062d826c1d319c370357a776"]) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:49 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000040)=ANY=[@ANYBLOB="0200000092baa94aabdf6d7ea36c958a4e08ca7904"]) write$P9_RMKDIR(r0, 0x0, 0x0) 01:14:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xff0f0000, @loopback}, 0x1c) [ 510.145131][T21744] fuse: Bad value for 'fd' [ 510.151653][T21745] fuse: Bad value for 'fd' [ 510.153488][T21742] fuse: Bad value for 'user_id' [ 510.172428][T21744] fuse: Bad value for 'fd' [ 510.181302][T21745] fuse: Bad value for 'fd' 01:14:49 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x40e00) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000100)={0x2, 0x0, [{0x1, 0x3, 0x6, 0x26, 0x8, 0x2, 0x6}, {0x2, 0x3, 0x6, 0xd1, 0x4, 0x10001, 0x1}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 510.249550][T21758] fuse: Bad value for 'user_id' 01:14:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) r3 = getgid() setresgid(0x0, r3, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x3000060, &(0x7f0000000580)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xbf}}, {@allow_other='allow_other'}], [{@smackfsdef={'smackfsdef', 0x3d, 'vmnet0&vboxnet0vboxnet1-GPLvmnet1,lo#user!-'}}, {@subj_type={'subj_type', 0x3d, 'security($'}}, {@seclabel='seclabel'}, {@permit_directio='permit_directio'}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@smackfsroot={'smackfsroot', 0x3d, '$\'$'}}]}}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xffffff8d, @loopback}, 0x1c) 01:14:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f766d6f64653d303030303030305230303030303070303030343030309f13e85a6398dc22643d634b786b31cb28125fc79604ca2917717be5e47728fada291abb0200000000000000246dea9b3d3d84372e7120f77b967d32eb61ec5234cbd55dff501f1b6a2463e9f3f91365e825e9f8519da74b5cc21a59ae30e06de5d24e2087e5dbf0", @ANYBLOB="80f095c43bfeaf13149eeb23240082069a837d27562a2a7b34dafbd8221e19e009f55420f30ce7141655f22930c9b5aa3d1c996c8cd365fad4e4a61935f4b10df6d0ded15d53855a946801eee7390575442465ea6d0ecc67ebf4f6059a4bf86b7977fa142ab9bcbeded28fc19d880107e1a1a344acb6fb7e202f93c4a9eda78efa31c5b9fb79a1290176f3e11b90dac001d71a7e567c46464b57c286cbbe41af51457a50", @ANYBLOB="c7c591369e87ae60fecd4b0fa0620ee98b3676007f048bd68810ae77e7ea327f014dfc8876ef77725ed0a5e42e88905767b5100ed911c2e24398682b1404508c09c8d52501ea82f6764b2eb6a64b5ba16cc24db95f94fcdcaf0966f0c15f904668f94afc4172abbd99fdeff6003f850db4f27b1d3d2ccd6bcae1fe", @ANYRESDEC=0x0, @ANYBLOB="5f41084a1e64fc005fe81d4259bb00000000000000019be446f61cdea0b0a3be4c4d2d5d0dd176d9ee73f9a5028f8d9b50f3c2f8f370f2bfe03a8497840c36f54aaff90a721c33e548a76b5a92903f613145d9144603dcdf53be00ec94533bf8b0a0488cf04fea0aa1dc26dc9d0d7d2ea4fed125c1fc3cd04c3764ff6343ac32e99e0cf1e7ddcd93a6e3dbedb9d8fe2db4b760e328385e"]) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000000)) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:49 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x22000, 0x0) close(r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="3943d857a8eadf4b4e47686406beb72b896a6a164ea4ac071280dc482361d814e95501b544407a1eb79caa1d8814424015645441fb4e0952c40fb117c5d302743e8a188ea9834ebe08419dbf213ffe43db70aab4b68675562782c76ee5f829eb3e516071176c688a7077b3071f3dbb1e8890bb28f0620a3ec9c2650de2c33aac68aabb"]) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = getuid() syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000180)='./file0\x00', 0x7b0e, 0x7, &(0x7f0000003b80)=[{&(0x7f0000000a00)="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", 0x1000, 0x6}, {&(0x7f0000001a00)="6a145ec6450b1ebf6d24e90cf546e4e8703cc024f9e8fc9a6c21f80faa2d2190256af5b20ea2dcfd89c2483c7c1596ad5642a4ef1547f65b4e8cf63cf849b63c0f137c11fc820d2d9d56f4b3358c3127b24f1b57507436c17a66d7b518563d5c30459ccd808264d5663db7eb91c4154d37daab58079af4dcf283bde76266a67aafbd32db8758defb1f157f830f3ce0ba1f75278a02524f59918e0de74891c84a6d674b8ff1c875f9bb151e0d54d7eb1cc6b6ea878b2824879a4d7c395e05342d6685680977a4b569a45570236bc38e82ad5a09078151f03e23f95d97b4ce72", 0xdf, 0x8}, {&(0x7f0000000280)="cbff4d79bfd2636ef9dee6388ee5df50df89cad077af8094f3bc26f500fac4cc7064c6230eb26ceef8e74ae4f97de5b6b4abe90d9ccfc8062a6ec86aae4fa89f83fa2b6a1dd5ff25582dd7f9c779f02aec5baa", 0x53}, {&(0x7f0000000340)="6b836456e434eec3", 0x8, 0x3}, {&(0x7f0000001b00)="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", 0x1000, 0xfffffffffffffffe}, {&(0x7f0000002b00)="c283282da0a8fa8056486de5eae9b15c1bd7697fcec832d9d961a494195d74a390b985a36a6b7dbc8eff190b20ddc345ee46a341d8e19724ed1e20c8c0109c6a4758f19b2761076be8869c3ce4e7c36e85745f19903e259952999106f3", 0x5d, 0x1}, {&(0x7f0000002b80)="658410d15e53f0c1b66e0f69975b67775ba6f8830bccfc0bf66a199498e9cca11be8b5d49d30f11d3480c73bb4e8959f17ce02bb54a79f8a8fcedd8413644cd3ad9624a4a53833aad4df4352764368849a040ce7e6e3e499939c5df0822091e6da9a950b69544e983203059bbe748f4a4e9c4660319b5db7ece4fc89059c3452089197f44e9a28bf90403c87d5ef596bb4c1b69e2e6e57a9003304d2c233171adc255d1d3f1c0772dd81a4351377ac3daff9cbfbb72563a22f1f08974d68b931a82f73772d3776e033f3622fb5e8a67415cff5eca855d13a118a8ce6fdc371461f652c44e7da57981e0f22e6579862e3b06576d7e01314068a20498186e886068bf9c6d878e5700899fbe0ed5bdfb06945b954f1711e38b17360e0dec50c662951ed9c42831c0b7ed58f5dfd1095b5b1f69e21c315c47ae7d274e9d2f91cd68df37ba3e0baaae40ca245fe0bdd780cec8345ed998a1a45e501bf10dc394efe70633a23654b8e4d752567f3a5be14132ac5c64389d1bbd9a694d2181902ed21b194dbb36dbada276807a9b45715639829e265a1b3e55c6543258c7af8d093177c2f4b868537ae4f65a613e7394f986b2b57d6ea27584f82bd2ee66d9c3663dfa41494e1a6fa963809496b9ad2065d69f352d6e87f45a44566699f507f49857dad1791f4d6b3c8e86c73a07fda47bfe39fdac65377aa260019b2e36ce46980c6028cabe6cc1f4df9fff03b7d6458ef6754cfbdd39f391d7a8a650e9f70a6e1831bd4c275e2f18b29588e37a5ce25684e3f0ae9128a60a4e5cc8e71faa5560130dc12fd090949b2015fce95e26f46583567cc1815f67a4cb1d754a6e7f754d409727194164ced7bdbfc541129a738a0c659165cbd2e31479944df3ffc8b8e8ab62f127b9ae0bac3d90d265b0ecc02988c3980969607155965b737e52ec8bb623646bf060a47eb1907392269dff03b3918b1813b326c691c48e20204046959e07f46c6ece2547ca7e7b4c133812c11c5ad2e415bf41241584e25ee46f4a06f3bb07284e9ca371a6d64d6a6a526256fa2f1326ecd3022450b72e8a07773410d5fdac0c537e39293b199dd9a56197f5c16be75fb57a69df283f0291ef8d2cbcd12211083433400d7b0fdad7dc83d54584d5598eacaaf1e38c3c63be31b1ea29296ae6da4362df965b83d03dbb158523db8e5e04188d5e91d5eb98b8017166958cc5fc06193f08edbea544ad3349343d7053e4e2bc586886b252c4f5c34efefb49fca1746b39f414b3dc66ed33d3d0c21433baccd333eb0a535abab81102e08e8d9257fb5247751b2f96607fc35f10b40c74eb98bada0946131ff08f93246183f3aa97beba4a17efbb6916e4af5a9c27e6d0a440c0976b410554d7c87d94d841933774209f4c8aeed69c155cfa29d0a03086492d8269daf937fb18a62209ef7b8861f207df55367d1947119fc87b0c2d9798b3197b05f3ce1156fc8c408f34fe33cbbd30addfda1342b8c3994b9cbd928370574e66cc37aa51c16664cce4787d9d6fb6d2adfa062e7202f39dc63f5656276368934f7add82065d2efe74796c1d303ba718b2855f537165da9c7fd7c6f59c0212f7d343229ac5574ba5872a43a245a201311a1a87714957ebb870103145802ded400593d00e6300955e0cde2930e511f4eaad63d8863a6957940648074601d40f297cb1af19d63d1baaee32d45e04a3ac04ea2fa8e0f3d2d531a23da7fb90593c0d8a9d3d3c594fa71ae4781384d349c1dbfa7e93178e96374d896a6501ca66df7d9a0fbdd085220f83bfd6b586c3a4e2499e26e89c89ab9d3f34111d930d038a05caf62bc841a77731d00f10aa258bf511d7904dce4c9ca31fc45350515916afc2efff03ffa82507b80895a3b14d9a98a5db1a3dde809f3bc0c73f4b72aca08693b5a01e66e5908d0b14fa402c53c36fbc1188a418ab9426c4500c7f3d89179b6c832c5487828407ca29ac949817bd1a472b23509d9a902f28296c7fd887af30addc0bfe03adad061d6a5a496ab0770830a2e52a2b92333e4073820204bf33261d77fc05ae61c31159157ced841c0dda185875af5dbf1ada5ee4227044b1e996585d42a65b33c8c89880a128e1e831dd97378eb1e108c03ceafeb53a27c89e06a51fe588e662394e584069e8e294225231c50f1add76e5a1d2e2c09ac20bbf3dad13a77cfbac8a3b205395a5014d94c2445fd2d5d731688c268c6c26f78ad9dcc5a942e14323145520a49ca4f388cd373f0f6addda8bbd81f1e1d935e43796c81b1fb60365d999356dcaa6aac3d49eb865e8ec2d37adf72045762117e7c506dcdac20556b56fa8206753950aa2f93648494c6d3f9730562d5366d74f18087efb710362cda26f0104fc0ca1ea0d483e71de97e23a7016a13acc5cb0b060ce190a47bb70772088b121a2c9dfaf3240664be8a2c74f87144c5f9130dc7289862ef5bd5b8b1064b50ab0618937d4b5e6b31aa062e4c3efa31f8148b8c1f6a91fd571e33b178d14e1ae1e49c917f61f39bd78a418e86bb35fb9cd54a047affac6934bdee36418e11a82908015b72e9f65a7b417ccbc8870ce71bbed6e0b81456a79925cd18d1f3f16e883609e9fe0fa315ca5c7344c5a6fe95a61ee8b199e6f5a684ac13ecd4b630c9b4131c89760098929d06641f8429d1166c8798ed849a7d75ea4736c04b46edf2528f04486cb3d73ca28b47b1fc3935212b7e4caa3e653c998f93838406cd7cc480e25e91a888cb2a124d69b31315e419ac1dc3b481486bddec2278eb6492010a3ac5fb69ced04243dd51bd05f9922c4af8581bf491d2849dbc2df04f75ed20b1c16793dc5749a46907620e0ac28bb04e422e9ddf9105c551760f6bc60e8619cb93ceb93023ca720181624d855432f482ffe81dbcb1ca5526fdaf0a01e96dd767112e2c19dcbcbf8a0bba45482c1d80bf4e184b2860bd088fc00116a7317cc39971a4c8e86fd79773810d9db837e280f53d37225c8b7b98847f1b5acbd32cc9927a2a248640c3281ac9a0fd059aab258ae6e33f253596bb8c6c6f41dbef3ff175c972c0f23e9874ca993045641ebf5c76b4bb56c7b8e5617408fc1f75c52e6b7a7336c816fa76f20f0d808a3162af8954e39efff2efec0237acc348c9ea70ae776f89c72d61bf9157634bb13abfdf71740e92270ce84b21b01089721271508caf516e916c9fc165e92151f4c449e8f28286f7d507ced8d0932117983ae5e87bc19e03f8bb806588ac6e608e8f6d0ff12d78589ac4362fac02a6fc1a54f85cbd069d2c8617b0d5d0b9e487dc7efa5bb29c60243bf441751eafe6e173f64f776d2cc566acc873be293a3ac62f62e62cadbbadfc31e75300d5ef92b4be168985fc61d9d9c8a1be7f16700ec0aae18708276667c52f9f85ec2c5dd8b8d63f93ab544e93e73fb10f2cf136cee93b0963fb270d339f537907943f0df067491658102ee4acbda555d65cfa2bd17c41e51cc3c411985ce762fdef1d76bc206c5ee793783d68002876f2877e9f3e10e3cdf3bc871bfe07774bc8df347c9e990cfd81acd2c40413da94c0bf87c33b583a6f4ba671b82e9d19cfd2db5af57ca4d6fa92c6ad7264e5887e909902e3e18acbac50c90227de61b77903ec4375cfe74cf2216e192cf274c2699479728954630213e625a7b65eb92018ea35738de7d5d7516b1a0c7304f300933de5de2512f4ec3581ffc6b05a63463dce390f9f49a58d3de9fff7418a672d54b2c5015652df3913497e07fb4af6967a6b13a6141f19c2944e5e6f389494de0c5b457738181d01035c146aa266de109f6e17bbb137e4906c85269598b2fc88c2509f08c01b8e1f80f8d8056b1ccf1a31d06ee07a472b481411e6563f3cbde32825260ae616ba26060a0c1d5f21a7265e0cad14eb0f7fecd20ce532518ebffab6e43daaceace3fd2abcde2286805adb9379213490c05bce009db721e5eff6b41346c4eb677606d538a91b1b901164d7786a92d1aea72a54b61dfe4171b1a58f19389543a6c181220bd293e228be1981aab4b5298313c675736373d4f824ef25c0d9501e95dedb9a213a5e9c936bd9fbcf6b0e79ff3dab2fd11efdc064b3521ec6a356e67e00d735fa4dda2c7099252b63845ec8a7536c3332700684a527d10e46503ccd8b9cfb98bdef00fad05dd0881f8179f55d198b14507aca402f0912a6835d9751f5786747779833e24395e3e3dcc2268e9a74daa5a905f53adf44e470d9b1e7dfef3bf20ccf1d394cbe046b5c69145284e29fedf9b9b15e5ab1476059368bfee4e2d44a894fce33f265f0e138014a234b9a35f5fa553aeac3cf4425b0b1ef744d050d0140eac462c8ba42d759b202633aa888e365bdcc225983913adac900e93210bf8af84772a51a3f7929f157f96d11e13fcd7ea4b8a458e63c99ae416a3c7865dc4e36c11ad52b02963dbef89c34459b3ab4d62ce7e7d10179f4578b696df15b8a08587f9b20259fc56bcc22b2e6ccb5664dca576967071fe45c8ec0ddf7e71d0b567f1a5717bde35e48e9f87bc4cab560734c03d7fc74fec35d63c6055f9f085105c09650417a9b934f5074bd6d379b9b05a4307690746daac23795a2c47ce179aeedee270df084d6db5fdced57fcfe08fd865b2d8d71e152e277b7ae8b8a9cffa0f056ce1c01c18f57ffc84d46af1cc665b70e7663cca46279a489a053e466295575f32d4056df9e5f568020d0ee9531561652d01aa1057725ff7fd80c4a5162aeea6fc9ea817a2bb899e77714d4418fab5c042ca4f6a9ff73dfd595a33bbec53df83b82db2bd841172c27639ecd38c1aa4ed3783bba1af94b5005bc879bbca110ed7f470278e366506cc11e3b1c9885debf767edc91d645548505b7f68d8e3788599deb4c90c53965064375077bfbe480cae38d2b0fe1d38408c3489959a991fa9586627490dfd8bf2dcfd47e5fdcb380d6de9311a52eeeb215f4cba3ec3873d1fff20ba3000e92d526bcf46a6cd04dade05df4acb31856e521b019bbe298f9a0ba765c285dceb2db02f831a4e9a42813f06b210f4b0ad436db5c609f3c27830edc504259a76287455566af2fee5840ceff7be8671f9bc40e380768ffbf29873e25348b1dd8a570d38e14d25ceee93e5c689cce249bc8da84ee24e55bf6a88c18fb2a381f0ae78a37742af9e03e71b3c092322646aa70fdf1c91c9cb1a4da3a0194123641f5fcf252fd5368f730249f07cdb9a2a186091d40196daa504bdb227d26321b981c0b0036ac7e72c9d8cc5cb52c11424332cd5ee7a7717fee6d57491a41e4b8b92da61f927ca4f78e35945e67277c6d337609d32f4b963dc5daeae50b0071ffb8b06b99bad4c8db985952853e28695a12c3e56b219504b3dc887726cdc83874b290116040dd9c74e370430c45a49272d127212c16a10758d0ac3aa9e9a941ac9baadf5925ab98ca983ad82c283e53e1b7c65124bfdbf72b2c1067072ebc2789d8ecf67623eb255e64fdc8270e9a53c1fdff2b87e88b3da05df9ee892fb336b8cfe62b20da4d3c6b9477bd0e4427718e05c46c602fc1147ddd4668c729b3c0727c2549cf5472eaec8a46d6305053652dd7466d22f1d2d55fb24893d3897697a3231cb1c2b72791817f92da877f8253d711411b7edf0c4122ae879d0954f1afed6d1c74e48a0f0b104c272e0197eeba2073d426f16f97382c934ad7a44be66f7fe516dc5940f169d1595e5fc8a4827e4e908ff5bf1ebf8cbe682690dadedb13b5ead7fc4b71640b0b2fd76cf8f0b156638493639569032636ce8d013da1", 0x1000, 0x9}], 0x1080001, &(0x7f0000003c40)={[{@umask={'umask', 0x3d, 0xfffffffffffff981}}, {@file_umask={'file_umask', 0x3d, 0x6}}, {@part={'part', 0x3d, 0xc0a5}}, {@dir_umask={'dir_umask', 0x3d, 0xbf3}}, {@uid={'uid', 0x3d, r3}}, {@umask={'umask', 0x3d, 0x3}}, {@codepage={'codepage', 0x3d, 'iso8859-15'}}, {@session={'session'}}, {@uid={'uid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/vcs\x00'}}]}) r5 = inotify_init() r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r6, 0x5421, &(0x7f0000000240)=0x7) ioctl$KVM_SET_XSAVE(r6, 0x5000aea5, &(0x7f0000000600)={"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"}) inotify_add_watch(r5, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 510.584690][T21776] fuse: Bad value for 'group_id' [ 510.590511][T21772] fuse: Unknown parameter 'roovmode' [ 510.701220][T21772] fuse: Unknown parameter 'roovmode' 01:14:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x600}, 0x1c) 01:14:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xffffffc2, @loopback}, 0x1c) 01:14:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000000)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:50 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="00000095ef438692945baa11fc0d3b90333e1b68a84e105bb50f37ff4b8537ac55f6195bc73f40d31cd69aba8b4b7bde9b93378e3c1dc163edb2b7dd4f04bd1ce966a181f9b4fb0b43d63a2ca137767dbad77aa14883c7160dc2a702fbfc1508f286c083137d6aa34660109b315900862c24ecd3e80c5260c8fff813175d2f880170a3164eab7452c4fb983fd1", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xffffffc4, @loopback}, 0x1c) 01:14:50 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x1, 0x18050, 0x9, 0xff, 0xff, 0x6}}, 0x50) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="5500000018007f5a480500b2a4a280930206000400a843096c2623692500160013000102", 0x24}], 0x1, 0x0, 0x0, 0x46020068}, 0x0) r0 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="240000001e005f0214ff040000000000000000000000000000000000080002", 0x34) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = inotify_init() r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x119002, 0x0) utimensat(r3, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0) inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:50 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xfffffff5, @loopback}, 0x1c) 01:14:50 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="66643d25e274c753ff81231935b97ac8e9236844551a9180ec43d65572c6dabcffc983eaeecd1ecab35357412e1464ddae954471771b987dcda3f6d6d3123e9d664498b9d287f5ed4b97e028213279039018a56a2361c9e2da9fe128b8ae30f79826f3d27a83ef39c39c2bc764abe8c3fc97e8f679c876c27858ab30021f60ed69e668dccf6ee3f71db85d9cae4446b32b00"/160, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x2}}, 0x1c) [ 511.694617][T21824] fuse: Bad value for 'fd' [ 511.775911][T21826] fuse: Bad value for 'fd' 01:14:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x700}, 0x1c) 01:14:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:51 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x7) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000100)='group_id', 0x8, 0x1) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x3}}, 0x1c) 01:14:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000008c0)={0x0, 0xfb, 0xf8, 0x2, 0x1, "7b83f8702edc69b086b9ea49edd2bc0f", "1d5dfc46bdc70aac2867d671418114fcf218f098762ace66d30bbbf02c0c9c015cd567f38eddce0463af16bf3e0b53fa4edc07dcf40aa78ebc02e57cc8c30e03ee2897a54922032cb5eeec6464856d6df59efca2c3cd20eb02594c1b28afbcc914b35ac43b13123270abc05245034b2f246ce26b0baf482477ea7d1a04ce7bb3c3d36fe367ecb4878b6906b3918e906025e15b4c93898a943f5fce5b63adf6a9f474de3943efdad81faab2c3678dc3116db53b3a45af34c53318e279f03826e5f410e6d597ad1113706a93b84caa4b9fc42392dc74d4ec04d16f59bacfcdd3e037a282"}, 0xf8, 0x1) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000004c0)) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r5, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x10000, 0x0) write$cgroup_subtree(r6, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="64bec767045d23c5d85cf736066379a43171996914feb9f2be0f1381e6a18dbe5edd379cee698b2ca8b55caf977ea667f4004c4cf4724c7762acb9b8f2b35838e4eb0340b6a7b844bddba1ce9b9950c2bf61b2d41e", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYPTR64], @ANYRES64, @ANYRES16=r5], 0x1b8) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x7) r7 = getpgrp(0x0) setpriority(0x0, r7, 0xffff) write$cgroup_pid(r3, &(0x7f0000000000)=r7, 0x12) ioctl$USBDEVFS_DISCONNECT_CLAIM(r2, 0x8108551b, &(0x7f00000009c0)={0x9fa, 0x2, "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"}) 01:14:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x4}}, 0x1c) 01:14:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x1, 0x5}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xc) 01:14:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x5}}, 0x1c) 01:14:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x3, &(0x7f0000000480)=""/195) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x6}}, 0x1c) 01:14:52 executing program 5: creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') times(&(0x7f0000000280)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000002c0)={0x7f, 0x1, 0x5, 0x4, 0x5, 0x0, 0x5, 0x6a, 0x1, 0x1e, 0xff}, 0xb) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="fffff21f00199ebc8cdec24a10d2f200d8a7dbcc5adc911d4835363047fcc88dad9ea3e2", @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d34e87f5b303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cbb5561442e763365127adc21da"]) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 512.988435][ C1] net_ratelimit: 14 callbacks suppressed [ 512.988453][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:14:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x900}, 0x1c) 01:14:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x7}}, 0x1c) 01:14:52 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2100, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = inotify_init() r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000380)={@initdev, 0x0}, &(0x7f00000003c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@gettclass={0x28, 0x2a, 0xa1e64faaf6b9d744, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xffff, 0xf}, {0x10}, {0x7, 0x6}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x22004000}, 0x10) inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x8}}, 0x1c) [ 513.310435][T21872] fuse: Unknown parameter '' [ 513.313834][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 513.399696][T21884] fuse: Unknown parameter '' 01:14:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r3, 0xffffffffffffffff) r4 = fcntl$getown(r3, 0x9) write$P9_RGETLOCK(r2, &(0x7f0000000180)={0x25, 0x37, 0x1, {0x0, 0x3, 0x0, r4, 0x7, 'user_id'}}, 0x25) 01:14:52 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f00000004c0)={0x1, "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"}) inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x1) 01:14:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c03006f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xb0080, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000100)={{0x81}, 'port0\x00', 0x93, 0x810, 0x4, 0x2, 0x2, 0x40, 0x7fff, 0x0, 0x1, 0xbaa}) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x9}}, 0x1c) 01:14:52 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00170f6218453af1f76bf45d092a5128ce613b20f591e3946592e86add46ac5e7b6cbd0d0fd6329b2819"]) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 513.716252][T21901] fuse: Unknown parameter '' 01:14:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xa}}, 0x1c) [ 513.815314][T21901] fuse: Unknown parameter '' 01:14:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x401) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000100)={0x1, 0x0, [0x1, 0x7, 0x33, 0x4, 0x4, 0x8000, 0x9, 0x4]}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 514.094192][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:14:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xa00}, 0x1c) 01:14:53 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="a8d4153d741c2c00"]) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xe}}, 0x1c) 01:14:53 executing program 0: perf_event_open(&(0x7f0000000340)={0x3, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x42}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='\xff\x00 \x00', 0xb4a5d77fb9188786, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'\r\x9c[\x04\x00'}}) r2 = inotify_init() seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000100)=0x47f) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x400003, &(0x7f0000000240)={[{@xino_auto='xino=auto'}, {@metacopy_on='metacopy=on'}, {@index_on='index=on'}, {@index_off='index=off'}], [{@euid_lt={'euid<', r4}}, {@obj_user={'obj_user', 0x3d, '#wlan1,eth1+*'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 514.264710][T21928] fuse: Bad value for 'group_id' [ 514.287980][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 514.326658][T21934] fuse: Bad value for 'group_id' 01:14:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000100)=0x1032) sendto$inet(0xffffffffffffffff, &(0x7f0000000600)="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", 0x1000, 0x20000804, &(0x7f0000000140)={0x2, 0x4e21, @multicast1}, 0x10) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000000)={0x8000, 0x40, 0x9, 0x7, 0x3ff, 0x6}) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x15}}, 0x1c) [ 514.334944][T21935] overlayfs: unrecognized mount option "euid<00000000000000003327" or missing value 01:14:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x5, 0x112, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x88832, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0xfffd}, 0x0, 0xd, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000100)={'lo\x00', {0x2, 0x4e22, @loopback}}) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030ff303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="fdb10408000000000000", @ANYRESDEC=0x0, @ANYBLOB="ac14"]) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:53 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f63a2fe50eca76e3dc56f746d4f64653d3030303030303030303030303030303030303430303030", @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16], @ANYBLOB="2c7c726d9c475769bb889094c344f1abf8b6a69ae80b1c254edd8038d8afaa97a0", @ANYRES64=0x0, @ANYRESHEX]) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xfc}}, 0x1c) [ 514.597248][T21948] fuse: Unknown parameter 'rocPn' [ 514.629493][T21949] fuse: Unknown parameter 'rocPn' [ 514.657039][T21950] fuse: Bad value for 'rootmode' 01:14:53 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:14:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x1f4}}, 0x1c) 01:14:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000100)=""/44) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = getgid() setresgid(0x0, r4, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) r7 = socket(0x5, 0x80001, 0x9) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r8) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000180)='./file1\x00', &(0x7f0000000240)='fuseblk\x00', 0x1450001, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@fowner_lt={'fowner<', r6}}, {@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r8}}, {@audit='audit'}]}}) [ 514.957888][T21966] fuse: Bad value for 'rootmode' 01:14:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xd90}, 0x1c) 01:14:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.SMACK64EXEC\x00', &(0x7f0000000140)='fuse\x00', 0x5, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67326f75708c2a8f74", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:54 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x2200}}, {@max_read={'max_read'}}]}}) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000600)) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x218}}, 0x1c) 01:14:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x0, 0x3, 0x0, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="7c643dbb43f49744709ea6b5430e530d6f6ca1fc6657a75da4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 515.255315][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 515.289511][T21984] fuse: Unknown parameter 'g2oup*t00000000000000000000' [ 515.301399][T21987] fuse: Bad value for 'fd' [ 515.337648][T21990] fuse: Bad value for 'fd' 01:14:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x240}}, 0x1c) [ 515.392493][T21993] fuse: Unknown parameter 'g2oup*t00000000000000000000' 01:14:54 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x2000050, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 515.450699][T21994] fuse: Unknown parameter '|d' [ 515.472241][T21994] fuse: Unknown parameter '|d' 01:14:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66883b", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\f\x00']) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000100)=@in={0x2, 0x0, @loopback}, &(0x7f0000000000)=0x80) getsockopt$inet6_dccp_int(r1, 0x21, 0xa, &(0x7f0000000180), &(0x7f0000000240)=0x4) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000004c0), 0x1000) 01:14:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x300}}, 0x1c) [ 515.683279][T22006] fuse: Unknown parameter 'f;0x0000000000000004' [ 515.747264][T22006] fuse: Unknown parameter 'f;0x0000000000000004' 01:14:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x40) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000100)=0x4) 01:14:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d304afeb39541c8448e5d4cc936239d37028a992fdc7c5890ba196a6c506b9449caad29b4d3a81b274c8aacc1b361ffc2f128b19d7bbb77693cd544012fd488791674670dbddddc636ed724d52148eec172f6222f575d497392a05067aa2d0fa311a13bc66f61ea", @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 516.043459][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 516.099038][T22025] fuse: Bad value for 'user_id' 01:14:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xdd8}, 0x1c) [ 516.164343][T22025] fuse: Bad value for 'user_id' 01:14:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x3e8}}, 0x1c) 01:14:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0600"]) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x230000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000100)={0x0, 0x5}, 0x8) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:55 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 516.198870][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 516.266429][T22034] fuse: Bad value for 'fd' 01:14:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x400000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000100)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x14) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 516.301382][T22034] fuse: Bad value for 'fd' [ 516.312363][T22035] fuse: Bad value for 'group_id' 01:14:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x500}}, 0x1c) [ 516.427440][T22042] fuse: Bad value for 'group_id' 01:14:55 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@subj_type={'subj_type'}}]}}) inotify_init() r1 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x8, 0x20a000) inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x20000000) umount2(&(0x7f0000000100)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x22081, 0x0) faccessat(r2, &(0x7f0000000140)='./file0\x00', 0x80, 0x1000) 01:14:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x600}}, 0x1c) [ 516.610815][T22049] fuse: Unknown parameter 'subj_type' 01:14:55 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 516.682288][T22051] fuse: Unknown parameter 'subj_type' 01:14:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r0, 0x5421, &(0x7f0000000240)=0x7) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f00000005c0)={0x1000, ""/4096}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYRES64]) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$sock_x25_SIOCADDRT(r3, 0x890b, &(0x7f0000001600)={@null=' \x00', 0x8, 'rose0\x00'}) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x700}}, 0x1c) [ 516.930677][T22061] fuse: Bad value for 'group_id' [ 516.996448][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:14:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x900}}, 0x1c) 01:14:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xde0}, 0x1c) [ 517.141977][T22061] fuse: Bad value for 'group_id' 01:14:56 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rmdir(&(0x7f0000000100)='./file0\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0xffffffffffffa5ab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) r4 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r4, 0x1269, 0x0) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r4, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYRESOCT=r0, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR=&(0x7f0000000180)=ANY=[@ANYRES32=r3], @ANYBLOB="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", @ANYRESOCT=r4, @ANYRES64=r0, @ANYRESDEC=r5], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRES32], @ANYPTR, @ANYRES64=r1, @ANYBLOB="0c4733ad37b0d8f35cc178fb487da5a9b12403ac1ec82286b7e013684c1bfbab0c5869d131e9cdf69393c29b9dbbb7ade03e072e581007f1014d16acb203fc7a5b49dda819ddc54e49d8f5553c65f51e1b0a8abedcb6aefd257c1b3cd1a9db944a3db2aa41a6a7cf773f359cf28e0d67e26ce28f"]) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) r6 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r6, 0x1269, 0x0) ioctl$TCXONC(r6, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r6, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$FIBMAP(r6, 0x1, &(0x7f0000000140)=0x6) 01:14:56 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0xd) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 517.287272][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:14:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4010}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)={0x204, r0, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x68}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x98d}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER={0xb8, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x984}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000000}]}, @TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xac37}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x2c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x585}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7a8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA={0x2c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x65ff229384fd5933}, 0x40) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xa00}}, 0x1c) 01:14:56 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000140000,\"seB_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00'/10, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) shmget(0x2, 0x3000, 0x1, &(0x7f0000ffd000/0x3000)=nil) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xd90}}, 0x1c) [ 517.590899][T22091] fuse: Unknown parameter '"seB_id' [ 517.636335][T22093] fuse: Unknown parameter '"seB_id' 01:14:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0xd3711d396ef10e15, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:56 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xdd8}}, 0x1c) 01:14:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x72) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0c0080755339503ef95f687c327c6353988fa96a0b211ed83acf7d81f706aa900ba06c66ac2e26f7080265f97f1780241335b4b0882aae51be95c19d91e0541d4eb11c5faa690339d87a5db266e971fd525fbb31c8098fa19bcfa34a9ad5846d443e9e579d76a7f7e776f4b7866a188d1f7c3aa222745519cdd38349eef635724dd8bf778142facae6d9d2c18eb56eba9c25422e7273300eead813c38141385944be9709772029a1d4fb26f0c5a4"]) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x189a8abf9ce3e0c8, 0x0) ioctl$USBDEVFS_DISCARDURB(r2, 0x550b, &(0x7f0000000140)=0x3) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xde0}}, 0x1c) [ 518.063483][T22114] fuse: Bad value for 'group_id' 01:14:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe00}, 0x1c) 01:14:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="c74f5908b7155fb22c000635196f2500000000e8d1d96fc8a5d4d6d71b628a9ef6a201006b2221d0ccd254c4f26fff7990515aeb394cccc9a1d0ba1bfedd376a7a7cf90518836b4c5afbeae1778175b13bb56e5bca7bb721e99707dd02dd051838f9ab3d6c039f65d1cebd72ed376b4970969f97c652402676d8816d9945bfbb9bbdaab7c27eccbca5faca36a64ae2283c66fd3bb17bc007b78309"]) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 518.174945][T22114] fuse: Bad value for 'group_id' [ 518.203613][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:14:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xe00}}, 0x1c) [ 518.276052][T22126] fuse: Bad value for 'group_id' 01:14:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) r2 = dup2(r1, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@smackfsroot={'\x00\xdf\f\x00', 0x3d, 'vmnet1'}}, {@fowner_gt={'fowner>', r3}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}}) r4 = inotify_init() ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000100)={0xf5d, 0x2, 0x1, 0x6, 0x2}) inotify_add_watch(r4, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r5 = socket$inet(0x2, 0x3, 0x8) setsockopt$IP_VS_SO_SET_ZERO(r5, 0x0, 0x48f, &(0x7f0000000280)={0x16, @multicast2, 0x4e24, 0x4, 'fo\x00', 0x23, 0x200, 0x76}, 0x2c) [ 518.367776][T22126] fuse: Bad value for 'group_id' 01:14:57 executing program 5: epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}], 0x3, 0xffffff94, &(0x7f0000000280)={0xd8}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d72f12e0380721c3d89f3b10cb72e5144dbebfe00d9a828bedc2f685f298cacb36e6d2ef2f5e6d48a4f218f33782e46b32fe8c8d0d72c8c331003850ce188a76c8aba171d66efaa3ed2e9e2237341f9ba77c3972b3f2e70e7463ebbcdfefec2f74e", @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400000) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x3f}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x4100c0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000180)={r3, 0x100000, r2}) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x1500}}, 0x1c) [ 518.543011][T22136] IPVS: set_ctl: invalid protocol: 22 224.0.0.2:20004 [ 518.626082][T22139] fuse: Bad value for 'user_id' 01:14:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x1802}}, 0x1c) [ 518.656712][T22144] fuse: Bad value for 'user_id' 01:14:57 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000000)={0x8000, 0x10000}) mkdir(&(0x7f0000000100)='./file0\x00', 0x44) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:57 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id'}}) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x2000}}, 0x1c) 01:14:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xf00}, 0x1c) 01:14:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x2ee0}}, 0x1c) [ 519.199705][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:14:58 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) r3 = creat(&(0x7f00000004c0)='./file0\x00', 0x90) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) ioctl$TCXONC(r2, 0x540a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c04c006412391955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca00"/212], 0x200600) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r5, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_proto_private(r3, 0x89ec, &(0x7f0000000600)="fb05c48c74da14d14d3bc58f53f4785431f6379a9d7b9c40c54c6353c53f51412d25bbdedf012c45ee9981a50163ebe5cdf5b7a5fc93010f0c6173067fcbf7a2ae6524c4ac408a4a6941a323d2e4f752d3c2645d3fc421e898317b29eee3e423cf0385917d9c56129c32405b1f72bdeb6c85151de9247d7c1124cd6249ea21aa41100c9ee7550849c549fa35de35026ac66642a945990b52770a5cec1acd3b0333f9621887bde8981c2614014050a244b2d5942583300dac35e80ff30d79312214c53065eb18594611526052e8ca3c07b8746f6e930b1dc266f9") pwritev(r6, &(0x7f0000000740)=[{&(0x7f0000000280)}, {0x0}, {0x0}, {&(0x7f0000000540)}, {&(0x7f0000000140)="d82a63a67db0905d22216f988ad69a815ee05bb5fc3b0679b423b1", 0x1b}, {&(0x7f00000006c0)}, {&(0x7f00000001c0)="9429b5b50cb5d7ad4c7bee7c7ce353e6bc63e9863ef212d9", 0x18}], 0x7, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000000340)={r7, @in6={{0xa, 0x0, 0x8001, @remote, 0x5}}, 0x5, 0x5, 0xffffffc1, 0x0, 0xffffffff}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000040)={0x10, 0x8, 0x10001, 0xffffffcd, 0x2, 0x1, 0x96a, 0x1c4c, r7}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r5, 0x84, 0x79, &(0x7f00000002c0)={r8, 0x0, 0xfff9}, 0x8) ioctl$int_in(r4, 0x5421, &(0x7f0000000240)=0x7) mknodat(r4, &(0x7f0000000000)='./file0\x00', 0x10, 0x7) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x20000, 0x0, 0x0, 0x400, 0x100000001, 0x0, 0x8}) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f0000000500)={'team_slave_1\x00', 0x9}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000100)={{0xff, 0x7}, 'port0\x00', 0x51, 0xc0000, 0x7fff, 0x87af, 0x0, 0x7, 0x8001, 0x0, 0x0, 0x7}) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x3f00}}, 0x1c) 01:14:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r1, 0x5421, &(0x7f0000000240)=0x7) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000100)={r2, 0x1, 0x6, @link_local}, 0x10) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cd6"]) inotify_init() openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x101000, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x100, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcs\x00', 0x40, 0x0) inotify_add_watch(r3, &(0x7f00000002c0)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:14:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x1b, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x8000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000000)=0x2da) 01:14:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x4000}}, 0x1c) [ 519.591523][T22184] fuse: Unknown parameter '&' [ 519.679286][T22191] fuse: Unknown parameter '&' 01:14:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x4002}}, 0x1c) 01:14:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="6664ff", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6fffff000eba3b3d051271d48958b1b1a0ffff2f3030307f0fb0fde69830302c757365725f01f8041ce933379269643d000009ea2463e228984abfd876531b9b6e2164d9ce679edb7b63f0ad78098f4bf0f049fd3318e4ea87ac7bb51e7b4046fc6c63b1f0fbd35b868796534874fd7ba2f4b9afbf629e12978cdee0ab9c9f8a89ddce9f634baf166a6f1cd590bf8e1ef3fbe5257259abdeaaf19c00edfdb8e9e1d755b1c42c07a933d043d0fcbb754e590763481394d4ce557259b954f39becdeb74d1b75f10192746425212d887ccbc424fa22b7480e1d9476e9", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0xddfd03836bb60055, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000140), &(0x7f0000000180)=0x4) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 519.939508][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:14:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d4e64653d303030303030303030303030303030303050043263583ce93034303030302c750f39544a9dbe942d03ec2a7fb15af5c647a998c95bc54f73f33bea6ee8f956c29fd3826516f11f7600000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x4, 0x100, 0x7}}, 0x30) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 520.015794][T22202] fuse: Unknown parameter 'fd0x0000000000000004' 01:14:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x1100}, 0x1c) 01:14:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x7fdc}}, 0x1c) [ 520.104522][T22202] fuse: Unknown parameter 'fd0x0000000000000004' [ 520.163432][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 520.193514][T22211] fuse: Unknown parameter 'rootmNde' 01:14:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x80fe}}, 0x1c) 01:14:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67896f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 520.347182][T22211] fuse: Unknown parameter 'rootmNde' 01:14:59 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) fcntl$notify(r0, 0x402, 0x2) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="5f9089c883546e2d21013fdcb2d8067f884f7b65e533f7cb7263f466f93779a856aa8126297fa03f2c6903fd6046ecc3795d13f3c8e6accaa842c243dccddac27d21", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file1\x00', 0x2) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 520.436169][T22221] fuse: Unknown parameter 'goup_id' 01:14:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x900d}}, 0x1c) [ 520.508785][T22221] fuse: Unknown parameter 'goup_id' [ 520.606855][T22227] fuse: Unknown parameter '_ȃTn-!?ܲO{e3rcf7yV&)?' 01:14:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:14:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xb8ff}}, 0x1c) [ 520.744210][T22233] fuse: Unknown parameter '_ȃTn-!?ܲO{e3rcf7yV&)?' 01:14:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c759bf8eaad69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x1802}, 0x1c) 01:15:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xc0fe}}, 0x1c) [ 521.047176][T22244] fuse: Unknown parameter 'uid' 01:15:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="ac8a"]) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 521.084987][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 521.145146][T22244] fuse: Unknown parameter 'uid' 01:15:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) mkdir(&(0x7f00000001c0)='./file0\x00', 0x8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x411, &(0x7f0000000140)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@noextend='noextend'}, {@access_any='access=any'}, {@mmap='mmap'}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}]}}) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 521.263573][T22254] fuse: Bad value for 'group_id' 01:15:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xd80d}}, 0x1c) [ 521.390303][T22254] fuse: Bad value for 'group_id' [ 521.432729][T22257] 9pnet: Insufficient options for proto=fd 01:15:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d34fdbefaadf1f18931d56d03e2a830e453405c470384eb32a42d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xdc7f}}, 0x1c) [ 521.590890][T22266] 9pnet: Insufficient options for proto=fd 01:15:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xe00d}}, 0x1c) [ 521.712135][T22269] fuse: Bad value for 'user_id' 01:15:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) sched_getparam(0xffffffffffffffff, &(0x7f0000000000)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 521.803979][T22269] fuse: Bad value for 'user_id' 01:15:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xe02e}}, 0x1c) [ 521.887994][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:01 executing program 5: r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xe803}}, 0x1c) 01:15:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x1a00}, 0x1c) [ 522.184615][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xf401}}, 0x1c) 01:15:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='g\xa8\x05z\x00', 0x8004, &(0x7f0000000340)={{'\x00', 0x3d, r0}, 0x2c, {'\x02\x00', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}]}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:01 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x11c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x80, 0x2, 0x3, 0x1, 0x0, 0xfa2, 0xd00b2, 0x7, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0x4fd6}, 0x2400, 0x7ff, 0x311, 0x1, 0x9, 0x5, 0x7fff}, r1, 0x3, r0, 0x2) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/41, 0x29}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000240)=""/65, 0x41}], 0x3}, 0x41) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000004c0)=0x40, 0x4) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9da066d6d5ea6debeac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x7) r4 = fcntl$dupfd(r2, 0x80c, r3) ioctl$SCSI_IOCTL_PROBE_HOST(r4, 0x5385, &(0x7f0000000580)={0xce, ""/206}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[]) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000480)='./file0\x00', 0x80000040) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r6 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r6, 0x1269, 0x0) ioctl$TCXONC(r6, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r6, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000780)={0xbe0d, 0x48000000, 0x2f, 0xffffffff, 0x2}) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xfc00}}, 0x1c) 01:15:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xfe80}}, 0x1c) 01:15:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0xc00}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x800}}]}}) r1 = inotify_init() r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x444062, 0x0) ioctl$USBDEVFS_GETDRIVER(r2, 0x41045508, &(0x7f0000000340)={0x6, "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"}) inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d08003030303030303030343030c14921303069643d0000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="ca495e4c0ed4091aee9afea0305dc66e2ab9b5becbe639fc0723c956d98baf64e704b3440bfacdfdeffd2b1fd68bd241072c7a32677d93"]) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 522.844207][T22314] fuse: blksize only supported for fuseblk 01:15:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xfec0}}, 0x1c) [ 522.936690][T22314] fuse: blksize only supported for fuseblk [ 522.960585][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 522.961891][T22318] fuse: Bad value for 'rootmode' 01:15:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x1b00}, 0x1c) 01:15:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e21}, 0x6e) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x81, 0x80000) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000100)=0x7fff) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 523.084014][T22318] fuse: Bad value for 'rootmode' 01:15:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xff00}}, 0x1c) [ 523.168538][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xff0f}}, 0x1c) 01:15:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@euid_gt={'\x00\x00\xf6+\x04', r2}}, {@obj_type={'obj_type', 0x3d, '{ppp0wlan0@GPLvboxnet1mime_typemime_typebdevmd5sum:em0\')y'}}, {@subj_type={'\xe2:\v\xcb\xaa\xfa=\xf4\x00', 0x3d, 'fusm\x00'}}]}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xffb8}}, 0x1c) 01:15:02 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x7, 0x1, 0x0, 0x74, 0x0, 0x4, 0x2a084, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x3, 0x453a}, 0x40, 0xff, 0x1, 0x8, 0x4d, 0x9, 0x9}, r2, 0xf, r0, 0x2) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="642df177c60bf623a05f5856665738871b3335793db41838aecb8c3ec58ff4a48918561c630c14452e041af070f1198d7c614d6543394a536a9c54677802d96f46f9800da3022c1494cbf675dd05422db8c047414133ef7d0865ad624e6df8cc41cf5f6c074f2b825232999c0f71280d0cc45e431b8cba3ec5497c3956d310698965bedf478f3715ecaf491149893182db43fad9cf7e467e2b05ef99262f229fe7749b5987c3531fc0378a4f0646abc2d07c76d00b6b92f8d8ee6cefa2b8e9aa55", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="3a19"]) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r4, 0x1269, 0x0) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r4, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000000)=0x6, 0x4) 01:15:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 523.635150][T22349] fuse: Unknown parameter 'd-w #_XVfW835y' 01:15:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x20000}}, 0x1c) [ 523.734126][T22349] fuse: Unknown parameter 'd-w #_XVfW835y' 01:15:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x50000}}, 0x1c) 01:15:03 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000100)={0x0, 0x0, {0x10001, 0x7, 0x3003, 0x9, 0xc, 0x8, 0x2, 0x3}}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000000)='./file0\x00') r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:03 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)=""/46) getsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000000)=0x48) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x1f, 0x0, 0x1f, 0x8d, 0x0, 0x8, 0x20240, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x3, 0x7}, 0x400, 0x2, 0x4, 0x0, 0xd0, 0x9, 0xc7}, r2, 0x5, r0, 0x1) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x2000}, 0x1c) 01:15:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x76435}}, 0x1c) [ 524.163144][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x80000, &(0x7f0000000240)=ANY=[@ANYBLOB="66643d2225bfe2096f84a58b28cfabb052d53e5d018671dca6e8cace8ea3817cc8184ade827d72cbdd49fc66f68db4dd5b547100cb5ca60040a214737ea368cadd38afecdc13a70f73", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000100)=0x1) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000140), &(0x7f0000000180)=0x4) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x20c49a}}, 0x1c) 01:15:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x1000000}}, 0x1c) 01:15:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c727c6f746d6f64653d303030303030303030300e303030303030308b838d975524303030302c7573657275cb0acff7b1edca4876ed0b42c09089fcf4788b3967484b590dd203db4229f6eb556d42529bb0c005e0b5f7763de2abc2685dabffaa2e0ee7916bc439ac57f893179da10794d1e22b63d5817febf7", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x50, &(0x7f0000000600)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other='allow_other'}], [{@smackfsdef={'smackfsdef', 0x3d, ']/md5sum#'}}, {@obj_type={'obj_type'}}, {@dont_appraise='dont_appraise'}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@dont_appraise='dont_appraise'}, {@dont_appraise='dont_appraise'}]}}) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 524.724768][T22387] fuse: Unknown parameter 'r|otmode' [ 524.742417][T22387] fuse: Bad value for 'fd' [ 524.761457][T22391] fuse: Bad value for 'fd' [ 524.762642][T22387] fuse: Unknown parameter 'r|otmode' 01:15:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x2000000}}, 0x1c) [ 524.960766][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x3000000}}, 0x1c) 01:15:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x2ee0}, 0x1c) [ 525.124682][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x4000000}}, 0x1c) 01:15:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x5000000}}, 0x1c) 01:15:04 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) accept$inet(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f0000000440)=0x10) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85d, 0x100000001}}, r1, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) syz_emit_ethernet(0x95, &(0x7f0000000240)=ANY=[@ANYBLOB="583cb253ef0700000000000091004800810031000011aaff5555e25f00f7af7af0089140b129463fc65c0291775c92aebf3e736b786fd81bc2d28bc285e59aa18518bb3a49eb9a3e70403724b7b70fe90ba5966c8c953d45d849533d55f47b5b627cc948e1c1808a4d59d368d9508f38549398381ef31099bb84b63e13d4f07293afbde67c1fc62d4a8109c67d4009a0bc403046b5"], 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='\x8a\xde\x00', 0x4001, &(0x7f0000000a00)=ANY=[]) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) r3 = add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)="05c98b4c52bc97fd85927be6e45d9a9a5c1b85b89284c0170642e1521e673fc66a", 0x21, 0xfffffffffffffffe) keyctl$invalidate(0x15, r3) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = dup2(0xffffffffffffffff, r2) write$selinux_attr(r4, &(0x7f0000000040)='system_u:object_r:dhcpd_state_t:s0\x00', 0x23) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dm\aA\b\x00\x00\x00\x00\x00ot\x00', 0x408205, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r6, 0x5421, &(0x7f0000000240)=0x7) r7 = getpgrp(0x0) setpriority(0x0, r7, 0xffff) fcntl$setownex(r6, 0xf, &(0x7f0000000300)={0x2, r7}) ioctl$VIDIOC_S_HW_FREQ_SEEK(r5, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r8 = syz_open_dev$sndctrl(&(0x7f0000000580)='/dev/snd/controlC#\x00', 0x4, 0x4000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r8, 0xc10c5541, &(0x7f00000005c0)={0x8, 0x5, 0x7fffffff, 0x0, 0x0, [], [], [], 0xd9e, 0x7}) 01:15:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x6000000}}, 0x1c) 01:15:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x22, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xf08d593953769904}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) pwritev(r1, &(0x7f0000000740)=[{&(0x7f0000000280)}, {0x0}, {0x0}, {&(0x7f0000000540)}, {&(0x7f0000000140)="d82a63a67db0905d22216f988ad69a815ee05bb5fc3b0679b423b1", 0x1b}, {&(0x7f00000006c0)}, {&(0x7f00000001c0)="9429b5b50cb5d7ad4c7bee7c7ce353e6bc63e9863ef212d9", 0x18}], 0x7, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000340)={r2, @in6={{0xa, 0x0, 0x8001, @remote, 0x5}}, 0x5, 0x5, 0xffffffc1, 0x0, 0xffffffff}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000480)={r2, 0xea, "fa79932a73213af3470e1138c316c09848ce11a3a944f4bbc7944dffb5affcc7e63bd368335212eb33ae5dbb369ce3350fe1d7bf6b8b9230f1ad1cb47a09bd32252f96464f847fe30acec4276fd4cb856541525e5eebd8d8355c1c095f94bc868ed5e19c142611a93975b8eb37a04d1778fe132c7b5530c53fa8d73af2acaf4401a82a9836d29fb41ef3e24811c8fd54eef2c28148d3e38b2bdf8041c67631e061663003a27b438d32a88df27fbcdc41364584990dd4536a34881ceca8609a8ead588e18233eaedf5c648c5bd4d149cb92c390914d91090688bb5acc8be860f3c2e91f4135b0da172f7e"}, &(0x7f0000000000)=0xf2) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r4 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r4, 0x1269, 0x0) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r4, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r5 = socket$netlink(0x10, 0x3, 0x0) pwritev(r5, &(0x7f0000000740)=[{&(0x7f0000000280)}, {0x0}, {0x0}, {&(0x7f0000000540)}, {&(0x7f0000000140)="d82a63a67db0905d22216f988ad69a815ee05bb5fc3b0679b423b1", 0x1b}, {&(0x7f00000006c0)}, {&(0x7f00000001c0)="9429b5b50cb5d7ad4c7bee7c7ce353e6bc63e9863ef212d9", 0x18}], 0x7, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000340)={r6, @in6={{0xa, 0x0, 0x8001, @remote, 0x5}}, 0x5, 0x5, 0xffffffc1, 0x0, 0xffffffff}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000280)={r6, 0xffffffff}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000b40)={r7, 0x6}, 0xc) r8 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1, 0x5) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', &(0x7f0000000240)='./file0/file0\x00', 0xffffffffffffffdb, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000280), 0x0, 0x454}, {&(0x7f0000000580)="cf8ae818bca899061f4d9ea0728cf65905504298d88f4ad9e2610da0d0400a0f8c71b35fd61eb3de29c0cd436f5765d62cfef4aa1d5a41521adb166e139cb63da69db55124e4aa300cca6b5d78f7fa8a69781a8c05532e8af528d12156b49dae68d93f86410bf8014082c7a070cfbc169850568de48ef23484226217d96dead16251ecb0167049dbf045c07bc17bb8b598848a4d37176136761a01758dfc607547f14572e20ab40793c90e51f34249b3343f5ac06e8910d9c56cad5727e8cd84ef9ac7fd566f66a3554faa51d16f11c8f1039b22083464904bdd416edf4a85f2b8a59403d8b56386d11265a3674ea01065e108ce6ff8", 0xf6, 0x7fff}, {&(0x7f0000000680)="d0031628b8520d8f9595a912bb75cfb4cec35b776752353ecaa3ffb2acf82b11bef57deedd54cdf673a2b2a5b701582a05881f9b27801012fbec3af8915930efada53da29eee121509e768dacb1e0f649c797a05e9a336cfdddf6a85a1fa5b2c096b403885179883203812dc4b2a13e7c2defe1f8f0bc0ee03d005aa36753c542257ebaeb478bd662890a02cc1ab95f378a744ee00d627198250a831f71b0e9231b3abb006a367dda0de4e55f3223d41", 0xb0, 0x2}, {&(0x7f00000007c0)="bfd2fa75121f1af09738a6f7c1a29452153cb946ae73ce58c82eeb209e697899fc984ce3422a0eaeb1480d769da8f65b9f991968c9e9ce7ad9334a46bdb7418795bfea5e6e3975b11a32d3f572556079fe7162567c105ed8ff72ba23575e682c24bf1370a06136d366d130526c5c70fd488c0a02a2ce58a205e65f198c3c8cf268", 0x81, 0xbd9}, {&(0x7f0000000880)="67c7f017a71515abeb9fcb3b5b224ea154dc71e07754f3a06651a213960633276293c1913d3cee2b7e0af82ef1b5315aadd810156171668245b2ad8c35227433915df6aebe9f18c39d481a8eda1281204c96cc0fb9108103a60f3f5e62d39a155c9612e48058254dbb06a9ef1698fcaacd37b659d1f2d3c9b06faba8c0ecaa3a5df9cb873e83ff55c11582eed7063089fc84a6308686", 0x96, 0x5}, {&(0x7f0000000940)="2a2b80d7d0b4d9c274eddd0d5e03a5c76449cc98c3d4c0579115b31bde57e62eef212490b9a0c2f58e2889f9af617cbf644f722eb6e1df7152c4de10ada4f82b5cef0d8121aecdcecf7a0ebec172d0489b58d4cc747490d58e936a4b708219de94bd8cf41c65f1f0783ac377c05b049a1ef51b9e3536e9004e10c52f6017d7eb2c2664ca0c2e7f6f0cea9db322c772c765ca8e9fc9e6f7cf08dfeede2b03233fafaaaf498b2ddd0cd4141927fdb405b63aab94ceb9de06c0", 0xb8, 0x4}], 0x80, &(0x7f0000000ac0)={[{@check_strict='check=strict'}, {@unhide='unhide'}, {@session={'session', 0x3d, 0x4b}}, {@map_off='map=off'}], [{@fsname={'fsname', 0x3d, 'rootmode'}}, {@seclabel='seclabel'}]}) ioctl$NS_GET_PARENT(r8, 0xb702, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x7000000}}, 0x1c) 01:15:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'us\t\x00_i$'}, 0x2c, {'group_id'}, 0x2c, {[], [{@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@dont_measure='dont_measure'}]}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x8000000}}, 0x1c) [ 525.927342][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x2, 0x109000) sendto$unix(r1, &(0x7f0000000140)="1f1149617f7275e2629d32943a9b3f5f98e8e74c4d5098656f556fb87ba0a50363dc70de970fa9d1990c326b60d118a88bf88bc75606ae4cf978ee661690836463a2864fe43a8cc3e9fbef2b0629b813bf6403b03a877ad8769ee23bf004da80b2a4512d39721c890d41048f622e0f3407631a683c7977e24b12d0a9e9", 0x7d, 0xf479861f5835116e, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x8) [ 525.995263][T22436] fuse: Unknown parameter 'us ' 01:15:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x3f00}, 0x1c) 01:15:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x9000000}}, 0x1c) [ 526.089905][T22438] fuse: Unknown parameter 'us ' [ 526.132431][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xa000000}}, 0x1c) 01:15:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="1e6d6292602937cc155a98c78c61"]) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 526.392431][T22454] fuse: Bad value for 'group_id' 01:15:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200000, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xe000000}}, 0x1c) [ 526.454567][T22454] fuse: Bad value for 'group_id' 01:15:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x146063c2}}, 0x1c) 01:15:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x10040, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r1, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000340)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) r3 = getgid() setresgid(0x0, r3, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000240)={0x78, 0x0, 0x2, {0x4, 0x8, 0x0, {0x6, 0x3, 0x0, 0x800, 0x2, 0xfffffffffffffffd, 0x7, 0x5, 0x6, 0x1, 0x6, r2, r3, 0x10001, 0x401}}}, 0x78) r4 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r4, 0x1269, 0x0) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r4, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) getsockopt$inet6_udp_int(r4, 0x11, 0x64, &(0x7f0000000000), &(0x7f0000000100)=0x4) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="ac14a8be2f242eea331c997de966884072937a6f5958444663d6c8f1124ee7a2d62510d6c8ec012e373824bbbb51c154259a1eca9cf93c3a858eb289aad3298fc83d53cc2c32a4335b564d248d8d9c60c100e846da12e768be93a401ae05000000f5c46c58399f08ff69b5ca63f72d784265132ba327d8a7b9adf8187f3c8c4fd7eccfbac9e11fc41e551cfe368fee0991a8b016b686a01421c0c2c3361e9c0bf80e5d667d8af18f303f24af4eacc1be0b295c6fbc32adfdbfaefb7779b1c6fff8b9794cfd6f32665aea5d60bd9a919a5ce20462469dd7ed24c36cc4d3aa3deb0beef5bee6df6e140762af09f6493ce68022f4f4ac", @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x802, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000340)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c70fce5e00000200800000000000eaf67a9eace3dbe8b12c8300a3459a64b3", 0x48}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00442003bcec2e3c9566c42cadc4bcf988d052df3d3b26c488f0b4981c5647ad8df2255245803de9308d0ff3e150592f837efa3a8c6a54f3d5a30f2ab782f63e9ae64a639c01a4211c7b47a6d9e0178825d92fd95e037f840f9d1ed21dd606096eaaffbd7096d33ca60f98268445eebfe2752d1a5dcc5649793906f0bcd57546e05026"]) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 526.784868][T22470] fuse: Unknown parameter '/$.3}f@rzoYXDFcN%.78$QT%ʜ<:)' 01:15:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x15000000}}, 0x1c) [ 526.896033][T22474] fuse: Unknown parameter '/$.3}f@rzoYXDFcN%.78$QT%ʜ<:)' 01:15:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x4000}, 0x1c) 01:15:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000240)=0x7) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRESDEC=0x0, @ANYBLOB="0000000000000000000089d35f87c80709de9d190b0828a678b6bcc9429ea2f2ef430f888759d87ba87049e934eddd43f67dcd36c0133582af0d09c5aeca7ac0acf7771f79b17f64803ee0af4f616b665fa11d2be1c9ed1bfaac66c3fb7794438edf81eb9c4a711860251d3475594926c4df40f50a45c6104fa2039a9d4b8c61982f72eb064cc0528019d754ed165ea54727b2066866ef3361ded981df5d2cad8309c29d06f88c462aec85a35e4a39325973d0743b8c3185c2b98d9c7c", @ANYRESDEC, @ANYBLOB='\x00\x00']) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r3 = dup2(r1, r2) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f0000000180)={0x5a1, 0x6, 0x5, 0x8551}, 0x10) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x410001) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000100)={0x62}, 0x1) [ 527.086504][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x18020000}}, 0x1c) 01:15:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$USBDEVFS_FREE_STREAMS(r2, 0x8008551d, &(0x7f0000000000)=ANY=[@ANYBLOB="d34000e512408888070b0c048687880b8c090009f58a06088c0000"]) inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000100)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='iso9660\x00', 0x8, &(0x7f0000000240)='\x00') setsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f00000002c0)={@broadcast, @multicast2}, 0x8) [ 527.223731][T22490] fuse: Bad value for 'fd' 01:15:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x1cdf1fd6}}, 0x1c) [ 527.334564][T22494] fuse: Bad value for 'fd' 01:15:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x20000000}}, 0x1c) 01:15:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='D=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0x90c8531819a23262, r4}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000810800010063627100180402000404060003000000003bae10ffffff9e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000100)={r5, 0x2000, 0x8, 0x1a, 0x5, 0x69, 0x5}) 01:15:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0xeb, 0x0, 0x8, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x20, 0x0, 0x5, 0x0, 0x0, 0x1000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB="2c67726f75705f69644ea9f959c45f45a09a30e6d56647f7203d", @ANYRESDEC=r2, @ANYBLOB=',max_read=0x0000000000000081,max_read=0x0000000000008121,blksize=0x0000000000000800,allow_other,allow_other,allow_other,default_permissions,max_read=0x04000000000053fa,\x00']) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 527.629547][T22506] fuse: Unknown parameter 'D' 01:15:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x35640700}}, 0x1c) [ 527.677503][T22508] fuse: Invalid rootmode [ 527.728947][T22508] fuse: Invalid rootmode [ 527.794812][T22506] fuse: Unknown parameter 'D' 01:15:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$sndseq(r1, &(0x7f00000004c0)=[{0x0, 0x41, 0x8, 0x0, @time, {0x20, 0x2}, {0xfa, 0x3b}, @raw32={[0x7fffffff, 0x2, 0x800]}}, {0x28, 0x73, 0x7, 0x1, @time={0x0, 0x989680}, {0xfe, 0x80}, {0x82, 0x4}, @result={0x3, 0x8}}, {0x8, 0x0, 0x7f, 0xd1, @tick=0x1, {0x1, 0xf2}, {0x5}, @ext={0x8a, &(0x7f0000000100)="4fe4c9671f95b158d650aeb25b0105cb4afb49921bdbfa541868b73d17147e121e521646ba8175e4c68708883d659c8c1829f8e74c92ca4c52f87a9a3ec1425b96c9314abf0e3c93fa1cd3b726afba98deb0c4a6fbf7fd9f7446fb81690aa62c88a72075c149169f6c6d833ef1f0fdc3a024cd2d313a1736b9091047a52469b6eb009929a1fcd8e10a34"}}, {0x0, 0x0, 0x1, 0x4, @tick=0x20, {0x11, 0x18}, {0x6, 0x81}, @result={0x2caf, 0x9}}, {0xe1, 0x1, 0x6, 0x0, @time={0x77359400}, {0x1f, 0x78}, {0x1, 0x1}, @raw8={"0307fe3fc6d711f9c915f19f"}}], 0xf0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = inotify_init() r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r4, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r4, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) renameat2(r3, &(0x7f0000000280)='./file0\x00', r4, &(0x7f00000002c0)='./file0\x00', 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000005c0)=""/219, &(0x7f0000000240)=0xdb) inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x3f000000}}, 0x1c) [ 527.875944][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 527.901782][T22518] fuse: Bad value for 'fd' 01:15:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x4002}, 0x1c) 01:15:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x40000000}}, 0x1c) [ 528.026823][T22523] fuse: Bad value for 'fd' 01:15:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000600)='/dev/input/mouse#\x00', 0xe7d, 0x20000) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000640)={'filter\x00'}, &(0x7f00000006c0)=0x44) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0xc9, 0x7, 0x8, "deb2e5a78638981c70f70903cfdecb6f", "dbe891479efc981359a50d551482dff97f8a475b9265f02ee1d7d3fcbea8089aff69244340ed5222ff5f8a538efb08252d0892c2c238830381b876dfb1552162ddc50beb1d070515ac133093320043fe814c656ca01addd72992570425b4e8359f289527e4c04a418575d2996f7e44deb07f47cb5a7109574e4404fb037dd4b98b1beb0d3329bae0c8c87eea6191c73810034b66269835baaa1526a2c3afb047ac5e179d64bc3efe11c1dbc7155504c28e4c8ea1"}, 0xc9, 0x1) [ 528.086383][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x40020000}}, 0x1c) 01:15:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x8, 0x1, 0x0, 0xec, 0x0, 0xac, 0x0, 0xe, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xa, @perf_config_ext={0xbf}, 0x14004, 0x8, 0x1, 0x58a60b506cd63ff4, 0x1, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:07 executing program 5: unshare(0x40000000) r0 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x271b, &(0x7f0000000040)=""/13, &(0x7f000033bffc)=0xae8) r1 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=@ethtool_test={0x1a, 0x0, 0x0, 0x182}}) 01:15:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x801001ef}}, 0x1c) [ 528.448420][T22548] IPVS: ftp: loaded support on port[0] = 21 01:15:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="2e22e1f1ffc349643dc8b4c2ed497ac7b89b831036d552728b2ff80f3c231dc9068150ec3c085681fe937c6a02a4ba2a33376bf8a97e801208c11de6fcfeb8444bf881ee1cf4efe8f3c0608f349dba974d56c56eafa2", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x8dffffff}}, 0x1c) [ 528.620605][T22555] fuse: Unknown parameter '."Id' 01:15:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x900d0000}}, 0x1c) [ 528.748329][T22555] fuse: Unknown parameter '."Id' 01:15:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x9ac42000}}, 0x1c) [ 528.865686][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 528.901404][T22548] IPVS: ftp: loaded support on port[0] = 21 01:15:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x4079}, 0x1c) 01:15:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xb8ff0000}}, 0x1c) [ 529.071135][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(0x0, 0x0, 0x0) set_mempolicy(0x2, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) ioctl$SG_IO(r1, 0x2285, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)="aefdda9d240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000100)="aa1d484e24002000a84d4583671e120755272bb736be94d9fc56c9953fbd80630600007704a71e023a27b2", 0x2b}], 0x2) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)='\x00', 0x1}], 0x1, 0x0) 01:15:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xc2636014}}, 0x1c) [ 529.210822][T22576] sg_write: data in/out 2097152/1 bytes for SCSI command 0x4-- guessing data in; [ 529.210822][T22576] program syz-executor.5 not setting count and/or reply_len properly 01:15:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xc2ffffff}}, 0x1c) [ 529.322954][T22583] sg_write: data in/out 2097152/1 bytes for SCSI command 0x4-- guessing data in; [ 529.322954][T22583] program syz-executor.5 not setting count and/or reply_len properly 01:15:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(0x0, 0x0, 0x0) set_mempolicy(0x2, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) ioctl$SG_IO(r1, 0x2285, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)="aefdda9d240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000100)="aa1d484e24002000a84d4583671e120755272bb736be94d9fc56c9953fbd80630600007704a71e023a27b2", 0x2b}], 0x2) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)='\x00', 0x1}], 0x1, 0x0) 01:15:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xc4ffffff}}, 0x1c) [ 529.598151][T22591] sg_write: data in/out 2097152/1 bytes for SCSI command 0x4-- guessing data in; [ 529.598151][T22591] program syz-executor.5 not setting count and/or reply_len properly 01:15:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xd61fdf1c}}, 0x1c) 01:15:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(0x0, 0x0, 0x0) set_mempolicy(0x2, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) r1 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) ioctl$SG_IO(r1, 0x2285, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)="aefdda9d240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000100)="aa1d484e24002000a84d4583671e120755272bb736be94d9fc56c9953fbd80630600007704a71e023a27b2", 0x2b}], 0x2) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)='\x00', 0x1}], 0x1, 0x0) 01:15:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xd80d0000}}, 0x1c) 01:15:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x4e00}, 0x1c) [ 529.922965][T22605] sg_write: data in/out 2097152/1 bytes for SCSI command 0x4-- guessing data in; [ 529.922965][T22605] program syz-executor.5 not setting count and/or reply_len properly 01:15:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xdc7f0000}}, 0x1c) [ 530.023398][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:09 executing program 5: bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f0000000240)={0x0, 0x0}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x401, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @remote}}}, 0x51) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @remote}}}, 0x88) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x400000, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000000280)={0x0, @reserved}) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) read(r0, 0x0, 0x38a) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x401, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @remote}}}, 0x88) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCGETA(r5, 0x5405, &(0x7f0000000140)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r4) 01:15:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xe00d0000}}, 0x1c) 01:15:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xe02e0000}}, 0x1c) 01:15:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xe8030000}}, 0x1c) 01:15:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xef011080}}, 0x1c) 01:15:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xf4010000}}, 0x1c) [ 530.801324][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x7700}, 0x1c) 01:15:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xf5ffffff}}, 0x1c) [ 530.970238][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) 01:15:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xfc000000}}, 0x1c) 01:15:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) 01:15:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xfe800000}}, 0x1c) 01:15:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xfec00000}}, 0x1c) 01:15:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r3, &(0x7f0000000240)=@un=@file={0xd80f49edce43012d, './file0\x00'}, 0xa) dup2(r3, r2) listen(r3, 0x0) dup2(r3, r0) connect$unix(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="00012e2f66696c653000"], 0xa) listen(r0, 0x0) 01:15:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xff000000}}, 0x1c) 01:15:10 executing program 5: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) [ 531.764663][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xff0f0000}}, 0x1c) 01:15:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x7940}, 0x1c) [ 531.966334][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:11 executing program 5: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xffffff8d}}, 0x1c) 01:15:11 executing program 5: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xffffffc2}}, 0x1c) 01:15:11 executing program 5: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xffffffc4}}, 0x1c) 01:15:11 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x20100, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0x4, 0xcc3, 0x5, 0x12, 0x7, 0x2, 0x399, {0x0, @in6={{0xa, 0x4e21, 0x10001, @ipv4={[], [], @rand_addr=0xfffff001}, 0x7}}, 0x344, 0x5be4749d, 0x6, 0x1, 0x3}}, &(0x7f00000002c0)=0xb0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000300)={r3, @in={{0x2, 0x4e22, @empty}}}, 0x84) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x10001, 0x7}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000140)={r4, 0x2}) r5 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) 01:15:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xfffffff5}}, 0x1c) 01:15:11 executing program 5: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000000580), 0x3c1) [ 532.735969][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x7b80}, 0x1c) 01:15:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x20000000000}}, 0x1c) [ 532.934957][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:12 executing program 5: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000000580), 0x3c1) 01:15:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x2000000000000}}, 0x1c) 01:15:12 executing program 5: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000000580), 0x3c1) 01:15:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x5000000000000}}, 0x1c) 01:15:12 executing program 5: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000580), 0x3c1) 01:15:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x100000000000000}}, 0x1c) 01:15:12 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x7) semget$private(0x0, 0xb36fcecc53f51b08, 0x290) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) write$FUSE_INIT(r0, &(0x7f00000000c0)={0x50, 0x0, 0x5, {0x7, 0x1f, 0x3, 0xc1004, 0x1ff, 0x6, 0x0, 0x266a6107}}, 0x50) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0x101) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r1, 0x8000, 0x3ff}, &(0x7f0000000200)=0xc) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) accept4$nfc_llcp(r0, &(0x7f0000000000), &(0x7f0000000080)=0x60, 0x0) uname(&(0x7f0000000400)=""/212) 01:15:12 executing program 5: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000580), 0x3c1) 01:15:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x200000000000000}}, 0x1c) [ 533.720963][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x7dc0}, 0x1c) 01:15:12 executing program 5: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000580), 0x3c1) 01:15:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x300000000000000}}, 0x1c) [ 533.941522][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:13 executing program 5: creat(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x400000000000000}}, 0x1c) 01:15:13 executing program 5: creat(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x500000000000000}}, 0x1c) 01:15:13 executing program 5: creat(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:13 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) 01:15:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x600000000000000}}, 0x1c) [ 534.706035][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x7fdc}, 0x1c) 01:15:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:13 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c106d4b7f040069643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x7, 0x600) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x10001, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000380)={0x0}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) r6 = semget$private(0x0, 0x1, 0x0) semop(r6, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) r7 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x100, 0x0) getsockopt$inet6_buf(r7, 0x29, 0x23, &(0x7f0000000640)=""/211, &(0x7f00000002c0)=0xd3) semop(r6, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$GETNCNT(r6, 0x0, 0xe, 0x0) semctl$GETVAL(r6, 0x3, 0xc, &(0x7f00000004c0)=""/117) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r5, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f00000003c0)={r4, 0x100000, r5}) r8 = openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x200, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000540)='9p\x00', 0x10000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@uname={'uname', 0x3d, '##ppp1'}}, {@noextend='noextend'}], [{@smackfsdef={'smackfsdef'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@fscontext={'fscontext', 0x3d, 'u\x01\x00r_\x1eF\x02\xd8\xabu\f4\x02\xaf\x80\xa8\xdet7\xed\xd6'}}, {@obj_user={'obj_user', 0x3d, '+/@eth0,'}}, {@measure='measure'}]}}) r9 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r9, 0x1269, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r10, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc003123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652f0800000000000000abada61a7d5959bc858c0a5e0045c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0400955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r10, 0x5421, &(0x7f0000000240)=0x7) ioctl$TCXONC(r10, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r9, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$USBDEVFS_DISCSIGNAL(r9, 0x8010550e, &(0x7f00000007c0)={0x9, &(0x7f0000000740)="aa7ec3b52034e78c69cab8fad02323f4b72f4bc5cc92813853390fa430ffd695ade4b425b845ab8cb71717178d3f82e6e013bc6daa76991086d48163422da747ad21d18cebb3a7aa9ce10e01b909989f3adf24344cfc8d3d070e9d7f4226d7a62154832d1504aef81b45031728f108c508bb8d34bb7652242d421983bb9d"}) creat(&(0x7f0000000000)='./file1\x00', 0x100) 01:15:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x700000000000000}}, 0x1c) [ 534.919540][T22804] fuse: Unknown parameter 'mK' 01:15:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x800000000000000}}, 0x1c) 01:15:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x900000000000000}}, 0x1c) 01:15:14 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x8351e3e13a6c3180) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r4 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r4, 0x1269, 0x0) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r4, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) write$P9_RMKDIR(r4, 0x0, 0xfffffffffffffc78) 01:15:14 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xa00000000000000}}, 0x1c) [ 535.679712][ C0] net_ratelimit: 1 callbacks suppressed [ 535.679721][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 535.713237][T22814] fuse: Unknown parameter 'mK' 01:15:14 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x807b}, 0x1c) [ 535.811988][T22842] 9pnet: Insufficient options for proto=fd 01:15:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xe00000000000000}}, 0x1c) 01:15:15 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="e0d599335ee07774e04ab2766bb6fdc62b117e04f9fbd58ad68e24fa8f4cdd601a8b7516c2da4558562aba1665"]) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:15 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) [ 535.945505][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x146063c200000000}}, 0x1c) [ 536.132084][T22857] fuse: Bad value for 'group_id' 01:15:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) [ 536.166753][T22861] fuse: Bad value for 'group_id' 01:15:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x1500000000000000}}, 0x1c) 01:15:15 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000240)=0xfffffff7, 0x4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou)_id=', @ANYRESDEC=0x0, @ANYBLOB="bc5b"]) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) getsockopt$inet6_dccp_buf(r2, 0x21, 0xe, &(0x7f0000000100)=""/163, &(0x7f0000000000)=0xa3) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) write$FUSE_LSEEK(r3, &(0x7f0000000040)={0x18, 0x0, 0x5, {0x1000}}, 0x18) [ 536.342160][T22871] fuse: Bad value for 'fd' [ 536.397098][T22871] fuse: Bad value for 'fd' 01:15:15 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self\x02\x81\x9b\xc6\xc6\v\x91\x83ec\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x42000, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f00000000c0)={0x5, 0x0, [{}, {}, {}, {}, {}]}) exit(0x3) write$P9_RMKDIR(r0, 0x0, 0x26d) rt_sigprocmask(0x1, &(0x7f0000000040)={0x6}, 0x0, 0x8) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 01:15:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x1802000000000000}}, 0x1c) 01:15:15 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r2) 01:15:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x80fe}, 0x1c) 01:15:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x2000000000000000}}, 0x1c) 01:15:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) [ 536.723856][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:15 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000000)={{0x0, 0x0, 0x7, 0x0, 0x401}, 0x7, 0x3, 0x2}) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x3564070000000000}}, 0x1c) 01:15:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) [ 536.849611][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x3f00000000000000}}, 0x1c) 01:15:16 executing program 2: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x9, 0x400) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fusLb', 0x0, &(0x7f0000000400)={{'Q\x00', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:16 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfb, 0x40}, 0xc) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000004c0)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0x200, 0x200, 0x128, 0x200, 0x0, 0x348, 0x348, 0x348, 0x348, 0x348, 0x4, &(0x7f0000000100), {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@inet=@udp={0x30, 'udp\x00', 0x0, {0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x8, @remote, 0xfe00, 0x1, [0xf, 0x20, 0xc, 0x34, 0x5, 0x2, 0x1e, 0x21, 0x3d, 0x3f, 0x38, 0x4, 0x1d, 0x21, 0x20, 0x38], 0x2, 0x8, 0x3ff}}}, {{@ip={@multicast1, @rand_addr, 0xffffff00, 0x1fe000000, 'syzkaller0\x00', 'netdevsim0\x00', {}, {}, 0x32, 0x2, 0x63}, 0x0, 0x98, 0xd8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x0, 0x2, 0x4, 0x6, 0x0, 0x4aec, 0x10001, 0x8]}}}, {{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x4, 0x0, 0x2}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x5, [0x210, 0xff, 0x2, 0xff, 0x9451, 0x9d], 0x2}, {0xf93, [0x2, 0x2, 0x7fff, 0x0, 0x9, 0x40], 0x5, 0x7f}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) mkdir(&(0x7f00000001c0)='./file0\x00', 0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="720b0000004de040d9b8", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:16 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400800, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x28a42) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) write$P9_RMKDIR(r1, 0x0, 0x7e) mkdir(&(0x7f0000000080)='./file0\x00', 0x100) 01:15:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x4000000000000000}}, 0x1c) [ 537.527579][T22933] fuse: Bad value for 'user_id' [ 537.569164][T22933] fuse: Bad value for 'user_id' 01:15:16 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="b5f83db37e971885cb95854c0c98e607586e8eef33dac685f82fe0", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303069643d00000000bcebf384413a1eba0000", @ANYRESDEC=0x0, @ANYBLOB="2c70dee1b1f98a3bd4b8b74d080df17bcf18d53afb2d8c12b1a63ec21d11da68c6cff4210378aa8dff5d8e61d48421c441e045a106c53264defae52d43d491", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) read$rfkill(r2, &(0x7f0000000000), 0x8) prctl$PR_SET_THP_DISABLE(0x29, 0x1) inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x900d}, 0x1c) 01:15:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x4002000000000000}}, 0x1c) 01:15:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) [ 537.797928][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 537.820782][T22954] fuse: Unknown parameter '' 01:15:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x801001ef00000000}}, 0x1c) [ 537.866873][T22955] fuse: Unknown parameter '' 01:15:17 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e23, 0x5, @empty, 0x80000}}, [0x1, 0x2, 0x5, 0x1, 0x5, 0xffffffffffffff4e, 0x401, 0xe3, 0x35d, 0xffff, 0x1ff, 0x7, 0x8, 0x7, 0x3c57]}, &(0x7f0000000040)=0x100) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x8dffffff00000000}}, 0x1c) 01:15:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:17 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x6, 0x40000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x60000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x120, r2, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x70}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_DAEMON={0x84, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x287e95a70ccdd2c}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xc}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="a39eb52fd7b5fb7db235fa30d4475b3d"}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x120}, 0x1, 0x0, 0x0, 0x24008058}, 0x20000000) exit(0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x18f) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000040)) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:17 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2040, 0x0) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f0000000040)={0x101, 0x8, 0x1ef}) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000100)) inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x100) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x900d000000000000}}, 0x1c) 01:15:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) [ 538.568031][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xb8ff}, 0x1c) 01:15:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x9ac4200000000000}}, 0x1c) 01:15:17 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='tv/\x80\x00\x04\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) [ 538.854592][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 538.907389][T23006] fuse: Bad value for 'fd' 01:15:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xb8ff000000000000}}, 0x1c) 01:15:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) [ 538.982718][T23008] fuse: Bad value for 'fd' 01:15:18 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="66603d570aa4cdf9d60379255cc33d2783372709832b24", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xc2ffffff00000000}}, 0x1c) [ 539.172762][T23017] fuse: Unknown parameter 'f`' [ 539.199267][T23019] fuse: Unknown parameter 'f`' 01:15:18 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x100) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000100)=0x4) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xc4ffffff00000000}}, 0x1c) 01:15:18 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x220000) r2 = socket$netlink(0x10, 0x3, 0x0) pwritev(r2, &(0x7f0000000740)=[{&(0x7f0000000280)}, {0x0}, {0x0}, {&(0x7f0000000540)}, {&(0x7f0000000140)="d82a63a67db0905d22216f988ad69a815ee05bb5fc3b0679b423b1", 0x1b}, {&(0x7f00000006c0)}, {&(0x7f00000001c0)="9429b5b50cb5d7ad4c7bee7c7ce353e6bc63e9863ef212d9", 0x18}], 0x7, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000340)={r3, @in6={{0xa, 0x0, 0x8001, @remote, 0x5}}, 0x5, 0x5, 0xffffffc1, 0x0, 0xffffffff}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={r3, 0x4}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={r4, @in6={{0xa, 0x4e21, 0x42bf, @empty, 0x24000000}}}, 0x84) [ 539.610064][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xc07d}, 0x1c) 01:15:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xd61fdf1c00000000}}, 0x1c) [ 539.828772][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xd80d000000000000}}, 0x1c) 01:15:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xdc7f000000000000}}, 0x1c) 01:15:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xe00d000000000000}}, 0x1c) 01:15:19 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0xc0505350, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000000080), 0x88, 0x2, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0xfffffffa, 0x0) 01:15:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xe02e000000000000}}, 0x1c) 01:15:19 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x206001) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='.\x00', 0xc0000080) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000480), 0xc, &(0x7f00000004c0)={&(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYRES32=0x0, @ANYPTR, @ANYBLOB="b3495cae26fbe473309b8f7d6c8c51d2dd8776abb843d82732ff8afd9e119ae4453c7cf6d684812073663561a458da7e0bb79250f95eca0d0efb84b0b88ea4b89aa70431391dc1fdf0bd1b9392ecfa5638f480f0de35c936b6107d916b55836fc348b360093adc03c74f76127d2b263d72c857e0ed6d804c10a4ff8e8ac6cffec936cc7b8fb217e764e3138a67a28e22df1b5769ed584020cd490f93a4ed913cfd3a3f9b847c9d38dd9523a0319c"], 0x4}, 0x1, 0x0, 0x0, 0x800}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) preadv(r3, 0x0, 0x0, 0x29) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)=0xcb, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xffffffffffffffd4}, 0x1, 0x0, 0x0, 0x404d110}, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x0]}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002dc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}], 0x28}}], 0x2, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, 0x0) write(0xffffffffffffffff, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026180a3f", 0x12) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) [ 540.611108][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xc0fe}, 0x1c) 01:15:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, 0x0, 0x0) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee1, &(0x7f00000000c0)={0x10, 0x1, 0x2, 0x0}) 01:15:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xe803000000000000}}, 0x1c) 01:15:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, 0x0, 0x0) readv(r0, &(0x7f0000000580), 0x3c1) [ 540.880804][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xf401000000000000}}, 0x1c) 01:15:20 executing program 2: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000015c0)='/dev/admmidi#\x00', 0x8, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f00000003c0)) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/del\x00', 0x100181, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x0, 0xf}}, 0x20) r3 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0x0, 0x8, 0x0, r3}) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000000c0)='./file0\x00') mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r5, &(0x7f0000000180)='./file0\x00', r4, &(0x7f0000000540)='./file0/file0\x00', 0x0) openat(r4, &(0x7f0000000040)='./file0\x00', 0x800, 0x20) syz_genetlink_get_family_id$tipc(0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) ptrace(0x10, 0x0) 01:15:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, 0x0, 0x0) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xf5ffffff00000000}}, 0x1c) 01:15:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 01:15:20 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0100000000000000c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r1, 0x5421, &(0x7f0000000240)=0x7) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000000)={0xb, 0x332e56b116f4ad8a, 0x7, {0x20, 0x2ff, 0x6, 0x6}}) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xd80d}, 0x1c) 01:15:20 executing program 2: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000015c0)='/dev/admmidi#\x00', 0x8, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f00000003c0)) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/del\x00', 0x100181, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x0, 0xf}}, 0x20) r3 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0x0, 0x8, 0x0, r3}) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000000c0)='./file0\x00') mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r5, &(0x7f0000000180)='./file0\x00', r4, &(0x7f0000000540)='./file0/file0\x00', 0x0) openat(r4, &(0x7f0000000040)='./file0\x00', 0x800, 0x20) syz_genetlink_get_family_id$tipc(0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) ptrace(0x10, 0x0) 01:15:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) readv(r0, &(0x7f0000000580), 0x3c1) [ 541.837603][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xfe80000000000000}}, 0x1c) 01:15:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x45a904, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/3\x00\xc9\xc9\xec\x80\xe3\xd7\x19)aF>\x11\x9ed\xa4IWj\xd4$,\x86\xf9\xa0r\x02A>\xb4p\xb0\xbe\xcf0\xb6\xaa\xc1\x00\x02\x9e\x9b\".O=\xf3\x86r\xffp\xcf\x93Z\xf5\xfe{\xd9L\x92\xc3\x1a\xafx\xd1s\xe4$\xf1\xd7\xc4V\x05\xb4\x8d\x86~\xed\xa1\x84W\x1d\t\x00\x00\x00\t\xb1]\x01\xf6\xfe\x0eP\xcex\xc6h\x16\x81\xb1\rO\f\xb0\xdd\x92b\x00\xacAp4\x93\xf02\xba\xe7\xed\xaeG\x1dL\xd8\x91/\xc5L\xc57\x94\xb4\xf6;\xb6\"b\xc0\xcf\xf6\xf6\x1a\xbe\f^gZ\va\x82\xf78\x8c\xa0=Q\x9cm\x0f\xf5\xdf\x9b\x1c7\r\xeb\x15\xc9\xd8/,\x0e\x11\xa6e2o\xe4^\x83\a\x9aLm)\xae\x10\xeb\xad\xed\x8d46\xa2]\xad\xf5\xf2L\xfae%\xc3[q\x11\xab\x1d\xa1\xda!M/\xa1\xd6\xc1\x84=\xef\xe6\x0f\xb9?\x93V\xb9\xe0V\xf1\x91\xdc\xc8,n\xfd\xcd\x93\xb6/\xd9K\x04\x99\nV\xb7\x02\xd5\x02\x84,\x817\xae\xb3\xf2!\x9a\xc41\x1a\x83\x82\xbf/\xd9O\x99\xec\xd3\x87M0\xf0\x19\x8b\xe8t\x82\xf6\b^\xf0\xb2SP\x18B\xb8\x98\x99\xec\x8e\xe1') write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x4e24, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r4}}, 0x18) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f00000002c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000240), r4}}, 0x18) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000140)={0x0, 0x0, {0x4, 0x0, 0x1, 0x5}}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f71705f69641d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) readv(r0, &(0x7f0000000580), 0x3c1) [ 542.121567][T23152] fuse: Unknown parameter 'groqp_id00000000000000000000' 01:15:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xfec0000000000000}}, 0x1c) 01:15:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{0x0}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) [ 542.237809][T23152] fuse: Unknown parameter 'groqp_id00000000000000000000' 01:15:21 executing program 2: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000015c0)='/dev/admmidi#\x00', 0x8, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f00000003c0)) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/del\x00', 0x100181, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x0, 0xf}}, 0x20) r3 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0x0, 0x8, 0x0, r3}) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000000c0)='./file0\x00') mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r5, &(0x7f0000000180)='./file0\x00', r4, &(0x7f0000000540)='./file0/file0\x00', 0x0) openat(r4, &(0x7f0000000040)='./file0\x00', 0x800, 0x20) syz_genetlink_get_family_id$tipc(0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) ptrace(0x10, 0x0) 01:15:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xff00000000000000}}, 0x1c) 01:15:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{0x0}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:21 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1f, 0x6f1e67a45fb7d912) r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x2) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x200000, 0x0) write$P9_RMKDIR(r1, 0x0, 0xfffffff7) socket$isdn_base(0x22, 0x3, 0x0) 01:15:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xff0f000000000000}}, 0x1c) 01:15:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xdc7f}, 0x1c) 01:15:21 executing program 2: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000015c0)='/dev/admmidi#\x00', 0x8, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f00000003c0)) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/del\x00', 0x100181, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x0, 0xf}}, 0x20) r3 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0x0, 0x8, 0x0, r3}) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000000c0)='./file0\x00') mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r5, &(0x7f0000000180)='./file0\x00', r4, &(0x7f0000000540)='./file0/file0\x00', 0x0) openat(r4, &(0x7f0000000040)='./file0\x00', 0x800, 0x20) syz_genetlink_get_family_id$tipc(0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) ptrace(0x10, 0x0) 01:15:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{0x0}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) [ 542.829899][T23190] fuse: Bad value for 'fd' [ 542.881368][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0xffffffff00000000}}, 0x1c) 01:15:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000580), 0x3c1) [ 542.964974][T23190] fuse: Bad value for 'fd' 01:15:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000000), &(0x7f0000000100)=0x4) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7d8b0cf585ca2198bc490c889c0ca22ee5044bafe8d6169d1d248557faed5fbf16c950f731b61c0089b7330f39bc45791edb5500c8824eb9f02830d32900"/74, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="00080004000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x2}}, 0x1c) 01:15:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000580), 0x3c1) [ 543.250743][T23218] fuse: Unknown parameter '} !I .K$W_P1' 01:15:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000580), 0x3c1) [ 543.382716][T23222] fuse: Unknown parameter '} !I .K$W_P1' 01:15:22 executing program 2: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000015c0)='/dev/admmidi#\x00', 0x8, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f00000003c0)) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/del\x00', 0x100181, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x0, 0xf}}, 0x20) r3 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0x0, 0x8, 0x0, r3}) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000000c0)='./file0\x00') mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r5, &(0x7f0000000180)='./file0\x00', r4, &(0x7f0000000540)='./file0/file0\x00', 0x0) openat(r4, &(0x7f0000000040)='./file0\x00', 0x800, 0x20) syz_genetlink_get_family_id$tipc(0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) ptrace(0x10, 0x0) 01:15:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x3}}, 0x1c) 01:15:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) prctl$PR_GET_FP_MODE(0x2e) 01:15:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, 0x0, 0x0) 01:15:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe00d}, 0x1c) 01:15:22 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$KVM_SMI(r0, 0xaeb7) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r1, 0x0, 0x0) [ 543.785946][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, 0x0, 0x0) 01:15:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x4}}, 0x1c) 01:15:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_bp={0x0, 0xcdc09e72702487fd}, 0x0, 0x100000000000000, 0x0, 0x1, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x7, 0x9, &(0x7f00000035c0)=[{&(0x7f0000000000), 0x0, 0x4}, {&(0x7f00000004c0)="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", 0x1000, 0x7}, {&(0x7f0000000100)="77f7f5c30a6f7d", 0x7, 0x7}, {&(0x7f00000014c0)="cffba5af99886f1f9e2beb4cd59b3485e2d85a2abba603a8bff2c56688d2e9659c020417b50dac66972d0906d6730d79622843e6a66983763e6299bf2df3aeda55720eca32c38d03ea024d31b900616e0c815978ea9cb84c4fe5da98f64a4a5ffdf6cf7b98ec67e8c7d64fd88275032c9ce5600d77002ee3cbc694cd9a1146a702ae3553b9e9680e0198bb3d3c467916180d2a449549627cab98244a16c40a079af15343ee01ad9ebbeaf85776ca71aa686628a82548177f5a6f063e959923c1bc094cd205e7119cbe7073ec9150663856787a2bc765cbcbfcbab3cdd585fa9d2b8d9942cc573a3d5c5ff59e7605394144a4a6758c2c972861e4030ea0808c0eec6aa30c760ea89579b546cc078029b77c091cff7591020fa858085f14a75f2a360416bb94543bf75829b29c52284ea4fc4b303058d1dfa8dbebd9698693f2af862e018888ea6a232b5482b0c5f881f6635ed8b3ef1b97cd3f804ef14681aaf9e734137a9064a81805e654e9f1ef758f35fd97f6629c78fb279d7b1080dc9108ace8b4f319945c46d31b5e7d704eed9952ba01c859aa6dc497ae88257ebb1235b98f9fe57da4907a492af16549fdbe28882c4eeda2244832ac586d63d58c9c12650b62ce8721aeface60bc561fdc7d12fca62daeaaaaaa5eccd2bf95157d3ac657745495e43f1459ea55c99577008281a7761796d33b7d3a398e55bf35c08e272aeb94f9e3e5e00ca0ef680a009f75fe18b46f2127f3565771e85422ae039505d6271611403a657978ceb990263bc98da4596628c7514cb95587bc273ba035fed6917f3c72d33f40669a1d8ee201f5fa267e23c493f76888d3b65f469a12b751f1080d723b5e3a35f92acc248c7a078cd1425fce21940c680bcb4cdcbbda5411913a154c030e020f2831a451838d55f430efce5b5c9c0a9ba86cdb8c711f29430b6184338ce6ad58c7e5e04225df2a1eb712078a8136f1e05f24c3e8b0935dbb1e58a7e7da090d0f09fb31efd8d9b839f8c519d9ceb60479c1622d566765847fc132fae79712b9acf6880ffbdc8e9453d482b9eadf46bbc0f20ea0df5a81071c73fab9069780da382431e6cc89a66bf68e5294b941fa643a7ba62dfda32361310764877409398f15c8e4d5e673153cec7e5053de760c0562332c9b8f1521d8f41b3e9b3280028ea9184b26332d75e179a27c070b690afca0246aa9bd0e6f0fe265c98a9ad23c8de13e198267c6c4ca345a0e0882033e6ee28d028ae1cbeca53d91e8fdf4225d8c6592bd689e050a7f515cc26a6e1ee3b6defb019a2ae4763ddc2232785745c7bf36ef2a1ca185f2158ca1e414744e23b4edd816d626c3cfd91253ca8d98ee294ef7c6b30db4d7262392b9b54e0a83520434ac850cb1cc6ae16521acb9326e2afcd7951fe09da555ffd63ac2fb539105d7505b7fad8eb7eec44de27367368f6fc005ebe474e9dd19aa9048c1e85b2ae0b386919294bb5826b8d002f0201bdaeff5329b38fc4cda20365ed83412311eb4975ce7877aea64aedb9360d3e6371d8b66f0b8fcc2138f97a27f6b33d46f6dfd3dc8376e0b5bf3bb9c0b653775eaf14a169c908d75a95d846d2796d4ebb18d2993feca923c306a5ccaa15b701f48bc69b7e7b14792b11c94794997f711c5456f16e2ed4ee5a33f3a0955e2dcfedd425d231d78188f7d2bda70645a46f60c4fae5092ec4e70b7b43c430794af5650d38959ae17a53a62a0cb5caa54b399ae2dfb9259c21290c98f2c37b4ccce02511986622d6650d68f3f225e1255f00716ce79c5a44370ab51bdce980b37bef687393f5d9e363bc1d36ee20c7b60eafee96c804f2029aecc257d3ad5c8e8f0a8c26537f0bd82c2826d95115fb0961cc9efd1de69b695c88f63b25ea0f790d21baa43d8608de4f7835678f801af1619bec67ed84c58ff59dc1d9497b3157a24396cef473662fa1d3a94015fb22a5df9f0b7e555859242bd8b18cdbeb5758b1e49f4ea1c3f5ce39f79af45a64849f2ae4f9655c2ccea144cd7a7d2f5899587322991c8d4182f2d1382131920b4abd1eae868e73efe488821d69eec3bbcd52ee5e0c949dc8f8eac6eb5377b7e709e159c31598e416be7b0a287054e4608ed9251a7bb0bba6124172ab195d30e7d9476373c2034d0645d2f007bbb067cfe8144cd474ddd8eafb5cf60113044d25b3aef4c3344abee2c35b40c6185a347f46046ed83ec13bb7716d43663a44ba0cd8e7e37fb2c156a6c9d428e734ed87776815c4f4e381acdb6fed6756634b8b135dbba8c25adaf1b29bb0c92853b443c46e3237d4f4d363edd373c7443ba363f27fcd76280644ca3cec7f48fd992bbba2fb51a7e15cba7da8820ca3f0a6539031c8eaa9e4f67a8827926e35e89dd5d213aa91dd9e66c22bbb384e6d65f673e7475f4c85ca2968e059c4f9d386f76ceb52b19e347d4d9b2fedb8ed6fdca33225a6253aa19976df3ddda5920e89f20944620cc0f34e5eec345291c2e4253a49ac88f9fe5a317ed2a229c4e73fdcef0d0dc64607075147f7d58eddc76bf7ea79576e058c73bda97fb2d219b033f17c56d88d9efe9459c06ce049c44dbef6f025000f14813df9bb0e8a5153a286400f3d083559a5d808814b27898d2ee191eb3703789cb7164661db1e072fa6f82c7230351bd6d99b0135fed0db95ff6ce66f31d51b8a6cd2166bcce865f07e50999c0f50b0710ed7f25e69c3c60508976fd6fa31b6ac6d1e46de7aa10911de859a3bcc4dafbad60c6489340090f5e1d67b401d55ed150c3db9f64456e13b2ddc2f3f4fff28aef1901c891dec467966dd7cd71d581e08913d3feb92e37911d4c611697f2d8cfee71f30e828a3239bef89a97e4c6dd8f127b5ecb3ab18f2f3d6906ea2599245d17d20e35e0c14352c961f510e7118588364a59ddfcbd7ca175fe4d5d6be3524c0e3ea70424738bbccd09b9779344de26ef8c1b9f2a4739eb4de762f4be4858ee849aba9ba76a49c92c65dafad4014e18ccd29aa1bde416d6c7d369d5242f6fb8ce99b9b143ac6095415a80b20bf65e8cacb9cdf5be4e1a436e6c5853093a11b1ff93500e7977469c333d49ade560c2998647e8ac3a5108d9a2dffdc5d5e61a9cc716201d87b4600f67934f8e5b6ef9b5b6398673f7ae69c41cf0a3a3f93e1b41f5ce1328d5a323a65026217d2a3326ef61529a661434ac8b5b26466a892b0537fb07289fa594b7585b5d56c7509b0e66798cc15bb70404581d1c8277f4060186aceb62cbedf664141614c96d299a0e19267375a5c3e55d92ef02d16bdf9d3d9f6b7d1f3290fb980a7773c98080c546a5f727d515f7014ee4ddb6a9d90cd964aa3623720a636f70561a903a068f87d7f8d328b2a7c6c906973d2a33cbcbb166af8942e6191f16d2f34c8652116a9b0fc87f097450ad71cdfb998172462093d04e75f255d3c3c3ea5f1e5ddb5aa3092c5ac5df2f01f61f8c80c5983d3c7d69b65df707d0fc5eb3e9dbc7bcfdb0360c70e50d2b7c3ece67275b7ee95b7291ad2b664f664de6610568c8bbea5796c04bf7c20f1635cff65b032a8c59c0e172353b37dce17781025195fd15d223b50ea495cb08e0750f49b625d540b500138b2a97bcc740d4549bc014627684d1844c52d75249878bc6105c0916f2d908be6c1b24fe32283b0683884df400c7d04240617ec6b23f7cd961c88cb656d989617358953417eb3657a0293b0cdd774d8da0e969762695eeacbbf39eaec0207a5f9fb3e5efcbe15e9269091bd0f9323b1bdc50399cf9e21fe3d69bb748f29ae3bdf4bde81e06270e98c3382d9b0553f9068afebabfdb9191801bfdae384680529aa2fcf7b1f4807bd66c40e9b9e59f93123ecc81822f91a88ee17589b0ae319122dfa6c43e7fc7ddc0ea2efd68b5ff9c6669f039d7201c5c0c347b48d634133e60d0d2fdf7556025af463cf73768d507a54234cfc27ec48db2d20b2b38dc1298f99c28405ce229fdfcc4aac58c698f435c8185e04df64db3cc03048530531927cbc36894cc205db0606a33025a3d135632f2930a8651cd8e503b3014a91a4732596d469879cedbde226d1820e813ada0d9fc81bf0fc1d846ed5ba58258285fee4294a17016628860dca32007b4c28a8da4f9aecc0b6340862177c79c0bd3ca9e1ab91aefa5191914b0df6fa52fbbbb1b64833a63e046db3d0599111d0a51ae2c05e0efa9f0e34d9cf4ef8b54c8c88087e2217af5cbdaa62741a073d726e3196b5ec3a47b0ac415abc7a4b369d6360043fcbdef6e4448f3188b32b72a96ea2845bcfa393fafc976f01fcf1eda6634106de16afd2cc2d685611cced3bdbdcfa611850ef892c6c94fc1ec65bce6f2f4d9c3cf050c0e4e875e67cb64ec054376c402d509acec30b3433315d16bcd411baaafe816ba2aa3e3562ca7bc6e5e8eb4fdf4c8672ecae768c84e90a1d12e297c3efd40fd0211a05a43eb28d892ee619d13c02b04933e864f952de1ae6f07f8ddfae43b946bf3ba9eed4f7138ad36f98dca48fac01eadff339e470aaac4bb9dd3a30cdf7c37e1a2e596f275786b25fc08451c8ebc196f7acb7c32dd2fd41efa819f3ccdee4966d085d1fa57e78e3a14e843df2795076ac1ac3838914bbb43d0591f3447affd4075ece4f981625cfb5b701abe37b9a60d746b568bdcc3605330e9e32fd0bbb4f91a415bf60b1d7d5720e787aa10dd62ae2042515cce5cb78ca25c62b84f51907ac15872dda361ee6c952485fca375ca4b8d16651f51fa6154bb42122a6bc642840c4d104f67901a420154590b80ba13b18004090573e4b4a5c663bba237fd37f049abf57b219ccc090a3c143799693e5ff3ca5740b0d29e1f57f1e16f41b0e5e134d4036231e633a05b1104c5a7a3293814174e4ebaa43a07730de4fc3a8ecba4feccc1ef833bbe6ed6e405fd792514b1af7dc4b85f8e995339a9a91e18107b28305311698d82b12d475a70e1d06f5e5fc858e6ae9d77ef43fc9e76e8d9d66212cd01335ab058e8c6179bf839ed619ea25a8e0094d8f1088cb7168b7e41721c86544fa95c25eee06aa4de16e80fbf65a5dc68dd50e696714620a06f69cc8bd32d89c76a93fc4134de70bbc7c17bf4cc9a3ed7033a8256cac4a3966781ba92e30f93802ef0510924f83ee488cf24a505f24e833d2f1f866a817711c23b757ee7d688066625d446a171746c7540b12f8ffeba986de2e0dd82bffde400e33da5778ce6523123a59cd8e1951bf4b679ee9c1594780718349db374bc05c1eddc61cecd1b6a43f50a2803c8bb7102ac646859b20dc71b52915469e8ea15e146fa7c37b50bf368ec91f27cfaf04c6ad423ac4e0278c681f317fd8aa90a413fab763c6319fdb6a757e64aaee9d1c6e771a8f78361456c493e047513859abba8d7b525424188f180760d44160495fc321a3b5be19751d082868bfa0cdbec431be3d65825352aae63343775d0852f638096ffd4f594dac1fffbdeb78405388ff00f707835418723d0859dde522535bd559f3a60a0587bea0c0bb4b15c54e22113588ad99e2033a979484d9cde8b68febcd319d72d0818d96234828cd344ced724c59241a950562c761043cf4918e482e0a35908f105a24c72831d06f09324a846607cbc73a962a5c86fa94ee0b5c9161142a8ef134fd12570b7dabfcdc92c771439aa9c59a25d03423cee5e5d7425fe4c7aaf39db2b7f623318bf2f12d3ecd2bcab85088d83d67c28b2da4b9ee5bb0f07e64f9f7477304c0462fc205222f6b5c321ff739c822e075bcd7ac3e3ea699fb821fdcad6f2bf4c", 0x1000, 0x615}, {&(0x7f0000000140)="2ab68412eb633a10093d2754365c24ec5235b8ee8d115c00ac27b8cd24a64c5a6c61e6c0960e1bb053c67e9ca030c9dd710f1b90d088b88976ec000000c13c961157e7f4a8244631f9941c", 0x4b, 0xbd}, {&(0x7f0000000240)="8910f960dfbee3fe2cd768895eec05b6cf826c5e75b76b43ff9599a0b95edce8275a66f8660e94edae4b039a363c178586d13cc38c42ff2f77ac776b0582aec12c9fd4e7f614cf57c78b5186c18fc59b55374a45fd7b304135a1b7c568399a133bcae52319711d5b5825e28a2027c5c27eb085d8b59711a8efe088", 0x7b}, {&(0x7f00000024c0)="955d508dc05aeb7dfce3481e6c90e274420f8affe90e93f962288a5825aa4a4a59ec21e4accd004ae5b39e347fe1e528383bd280a2889c18123ef778b9fcd86c56520d94e6319575089b28b54eb6a43568424b5b108a940b18f452f0c32c2edf4d2025674b185748077f03b451a48150fec6ed8daa00066edb77f2f3ef39c52aabd22b067009444edce07b3d25a929ec4531d5b0441262ad6e675d5380df77cf7e4b15fabca3d3efa50919eea0630cf8df04d7b933c9ab03ea3efbd795926f92dcf175e897e1518a040244a4a3e26aa6e82184d49f3856845e6b5eee97de", 0xde, 0x6f62}, {&(0x7f00000025c0)="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", 0x1000, 0x3}, {&(0x7f00000002c0)='-=\x00', 0x37d, 0x2}]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)='security.SMACK64IPOUT\x00', &(0x7f0000000380)='rootmode', 0x8, 0x1) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, 0x0, 0x0) 01:15:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x5}}, 0x1c) 01:15:23 executing program 2: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000015c0)='/dev/admmidi#\x00', 0x8, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f00000003c0)) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/del\x00', 0x100181, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x0, 0xf}}, 0x20) r3 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0x0, 0x8, 0x0, r3}) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000000c0)='./file0\x00') mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r5, &(0x7f0000000180)='./file0\x00', r4, &(0x7f0000000540)='./file0/file0\x00', 0x0) openat(r4, &(0x7f0000000040)='./file0\x00', 0x800, 0x20) syz_genetlink_get_family_id$tipc(0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) ptrace(0x10, 0x0) 01:15:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f00000000c0)={0x0, [], 0x7}) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, 0x0, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000440), 0x0) 01:15:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x6}}, 0x1c) 01:15:23 executing program 5: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x1f, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0}) 01:15:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x7}}, 0x1c) 01:15:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe02e}, 0x1c) 01:15:23 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000)=0x7, 0x4) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:23 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev, 'dummy0\x00'}}, 0x1e) 01:15:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x8}}, 0x1c) [ 544.692529][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:24 executing program 5: 01:15:24 executing program 2: 01:15:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x9}}, 0x1c) 01:15:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = shmget$private(0x0, 0x2000, 0x1, &(0x7f0000ffd000/0x2000)=nil) shmat(r2, &(0x7f0000ffd000/0x3000)=nil, 0x1800) shmctl$IPC_RMID(r2, 0x0) 01:15:24 executing program 2: 01:15:24 executing program 5: 01:15:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0xa}}, 0x1c) 01:15:24 executing program 5: 01:15:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe803}, 0x1c) [ 545.519042][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0xb}}, 0x1c) 01:15:24 executing program 2: 01:15:24 executing program 5: 01:15:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) r1 = inotify_init() r2 = socket$inet(0x10, 0x2, 0x6) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r3, 0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000240)={{0x1, 0x0, @identifier="8bbd52b8d0be1a2fa6a1e8c3a9c6754b"}, 0x32, [], "16919853fd6dc65fcbdb870c8a2ff126839f2fc9386df3dac3524a5ffc6169b71d35004199c851ebe8dc17a3980a2a85dd43"}) inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:24 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r1, 0x5421, &(0x7f0000000240)=0x7) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000000)={0x1ed2e6452a55a251, @sliced={0x9, [0xa0, 0x7, 0x20, 0x2, 0xff, 0x1f, 0x4, 0x20, 0xfffb, 0x7, 0x7f, 0x2, 0x697, 0xfffc, 0x40, 0x6, 0x4, 0x4, 0x1, 0x3, 0x7f, 0x40, 0x1, 0xfff, 0x5, 0x2, 0x595, 0x3, 0x2, 0x7, 0xfffe, 0xff, 0xeb5, 0x4, 0xfffe, 0x7fff, 0xc000, 0x4, 0x200, 0x8001, 0x5, 0x43, 0xffff, 0x6, 0xffff, 0x0, 0x3, 0x9], 0xffff}}) 01:15:24 executing program 5: 01:15:24 executing program 2: [ 545.714110][T23343] fuse: blksize only supported for fuseblk [ 545.730415][T23343] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 545.752240][T23343] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 01:15:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0xc}}, 0x1c) 01:15:24 executing program 2: [ 545.844210][T23343] fuse: blksize only supported for fuseblk 01:15:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x300}}, 0x1c) 01:15:24 executing program 5: 01:15:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xf401}, 0x1c) 01:15:25 executing program 2: 01:15:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303430303075a161bf88bb50192c85ee99bd29bd8c302c757365725f69643d40433dc20856009cb602a9ec9a8a2306c72ac9416dd2d9d5393c3c2f2cf779f65c3fbd146f03ababc3ff23cd9c527e3e3df63f2d8c", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r2, 0xffffffffffffffff) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x5) fallocate(r4, 0x0, 0x0, 0x3) fallocate(r4, 0x3, 0x0, 0x108001) fallocate(r3, 0x0, 0x0, 0x800) sendto(r2, &(0x7f0000000000)="b2f872a3688924fe5e67622093eb6284f9e73c899d32bf11b8bd0b9662e08d93826174f5a38adb1967a67c9c4393409e560bcd16f4e418", 0x37, 0x0, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1101}}, 0x1c) 01:15:25 executing program 5: [ 546.384977][T23378] fuse: Bad value for 'rootmode' [ 546.442831][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:25 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0xfffffffffffffffd) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:25 executing program 5: 01:15:25 executing program 2: 01:15:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1540}}, 0x1c) 01:15:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000100)={0x7, 0x0, [{0x40001dc6, 0x0, 0x80}, {0x8ad, 0x0, 0x1}, {0xa2e, 0x0, 0x4}, {0x2bd, 0x0, 0x7}, {0x373, 0x0, 0x5}, {0xbe9, 0x0, 0x8}, {0x4849998f24611b70, 0x0, 0x3}]}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:25 executing program 2: 01:15:25 executing program 5: 01:15:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xfc00}, 0x1c) 01:15:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0xffffff1f}}, 0x1c) 01:15:26 executing program 2: 01:15:26 executing program 5: 01:15:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cd1"]) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 547.233847][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 547.297363][T23412] fuse: Unknown parameter '' [ 547.356823][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 547.435265][T23412] fuse: Unknown parameter '' 01:15:26 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-selh,attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r1, 0xffffffffffffffff) r2 = dup(r1) ioctl$SIOCAX25CTLCON(r2, 0x89e8, &(0x7f0000000000)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, 0x1, 0x9d3, 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 01:15:26 executing program 5: 01:15:26 executing program 2: 01:15:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:15:26 executing program 5: 01:15:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40000, 0x0) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000100)) 01:15:26 executing program 2: [ 547.534916][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 547.624157][T23431] fuse: Bad value for 'fd' [ 547.727213][T23437] fuse: Bad value for 'fd' 01:15:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xfe80}, 0x1c) 01:15:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x2}, 0x1c) 01:15:27 executing program 5: 01:15:27 executing program 2: 01:15:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 548.142808][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 548.223217][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 548.298491][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:27 executing program 5: 01:15:27 executing program 2: 01:15:27 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) 01:15:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x3}, 0x1c) 01:15:27 executing program 2: 01:15:27 executing program 5: [ 548.437246][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0x1c) [ 548.672818][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xfec0}, 0x1c) 01:15:28 executing program 5: 01:15:28 executing program 2: 01:15:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x5}, 0x1c) [ 549.138814][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000000)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@appraise_type='appraise_type=imasig'}, {@hash='hash'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@euid_gt={'euid>', r1}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@uid_lt={'uid<', r1}}]}}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:28 executing program 2: 01:15:28 executing program 5: 01:15:28 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread0x0, &(0x7f0000000100), &(0x7f0000000140)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id'}, 0x2c, {[], [{@fsmagic={'fsmagic', 0x3d, 0x9}}, {@pcr={'pcr', 0x3d, 0xb}}, {@appraise='appraise'}, {@fsname={'fsname', 0x3d, ',\'}nodeveth1!wlan0@,md5sum'}}, {@obj_type={'obj_type', 0x3d, 'group_id'}}, {@appraise='appraise'}, {@uid_gt={'uid>', r1}}]}}) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 550.435994][T23542] fuse: Unknown parameter 'fsmagic' [ 550.518551][T23542] fuse: Unknown parameter 'fsmagic' 01:15:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xff0f}, 0x1c) 01:15:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="e1fee3") syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffffc) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000000)={0xf}, 0xf) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:15:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x9}, 0x1c) 01:15:29 executing program 5: r0 = semget(0x3, 0x1, 0x0) semctl$GETPID(r0, 0x0, 0x4, 0x0) 01:15:29 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$RTC_WIE_OFF(r2, 0x7010) eventfd(0x300000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00f82ae91898fd71c890dcdfe87f0c361bd8f1edee187e6bc36a69e419cf5f432d65b7b553e112ecb9d43ba8e4aeb960860edd9dd8b10eb127"]) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) eventfd(0x4) r4 = syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) r5 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x0, 0x4000) connect$l2tp(r4, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r5, 0x2, 0x4, 0x4, 0x3, {0xa, 0x4e23, 0xf57a, @local, 0x82a0}}}, 0x32) 01:15:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) 01:15:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xa}, 0x1c) 01:15:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000440), &(0x7f0000000480)=0x4) 01:15:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000000)=0xbce6, 0x4) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r1, 0x0, 0x0) 01:15:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:30 executing program 5: r0 = semget(0x3, 0x1, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/147) 01:15:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe}, 0x1c) [ 551.519810][ C0] net_ratelimit: 8 callbacks suppressed [ 551.519821][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xffb8}, 0x1c) 01:15:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) r1 = inotify_init() r2 = socket$inet(0x10, 0x2, 0x6) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r3, 0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000240)={{0x1, 0x0, @identifier="8bbd52b8d0be1a2fa6a1e8c3a9c6754b"}, 0x32, [], "16919853fd6dc65fcbdb870c8a2ff126839f2fc9386df3dac3524a5ffc6169b71d35004199c851ebe8dc17a3980a2a85dd43"}) inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x15}, 0x1c) 01:15:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x80, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x3, 0x6}, 0x0, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/di~/f&\xa9e\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="077bb27a586339b88331760b03dc4d78333443f6a945"]) r1 = inotify_init() r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) ioprio_get$pid(0x2, r3) inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 551.810819][T23604] fuse: Bad value for 'fd' [ 551.832520][T23602] fuse: blksize only supported for fuseblk [ 551.846325][T23602] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 551.853025][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 551.861574][T23602] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xfc}, 0x1c) [ 551.876226][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 551.877311][T23604] fuse: Bad value for 'fd' [ 551.909367][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xff0f}, 0x1c) 01:15:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) r1 = inotify_init() r2 = socket$inet(0x10, 0x2, 0x6) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r3, 0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000240)={{0x1, 0x0, @identifier="8bbd52b8d0be1a2fa6a1e8c3a9c6754b"}, 0x32, [], "16919853fd6dc65fcbdb870c8a2ff126839f2fc9386df3dac3524a5ffc6169b71d35004199c851ebe8dc17a3980a2a85dd43"}) inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 552.039479][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 552.103283][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:31 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffff, 0x2bc400) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x1f4}, 0x1c) [ 552.158004][T23620] fuse: blksize only supported for fuseblk [ 552.183926][T23620] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 552.198227][T23620] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 552.270502][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x218}, 0x1c) [ 552.392217][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x20000}, 0x1c) 01:15:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) r1 = inotify_init() r2 = socket$inet(0x10, 0x2, 0x6) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r3, 0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000240)={{0x1, 0x0, @identifier="8bbd52b8d0be1a2fa6a1e8c3a9c6754b"}, 0x32, [], "16919853fd6dc65fcbdb870c8a2ff126839f2fc9386df3dac3524a5ffc6169b71d35004199c851ebe8dc17a3980a2a85dd43"}) inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x240}, 0x1c) 01:15:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x1f4}, 0x1c) [ 552.744628][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 552.759987][T23645] fuse: blksize only supported for fuseblk [ 552.769345][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 552.779471][T23645] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 01:15:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x300}, 0x1c) 01:15:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xffb8}, 0x1c) [ 552.791367][T23645] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x3e8}, 0x1c) 01:15:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) r1 = inotify_init() r2 = socket$inet(0x10, 0x2, 0x6) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r3, 0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000240)={{0x1, 0x0, @identifier="8bbd52b8d0be1a2fa6a1e8c3a9c6754b"}, 0x32, [], "16919853fd6dc65fcbdb870c8a2ff126839f2fc9386df3dac3524a5ffc6169b71d35004199c851ebe8dc17a3980a2a85dd43"}) inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x500}, 0x1c) 01:15:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:32 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) pwritev(r2, &(0x7f0000000740)=[{&(0x7f0000000280)}, {0x0}, {0x0}, {&(0x7f0000000540)}, {&(0x7f0000000140)="d82a63a67db0905d22216f988ad69a815ee05bb5fc3b0679b423b1", 0x1b}, {&(0x7f00000006c0)}, {&(0x7f00000001c0)="9429b5b50cb5d7ad4c7bee7c7ce353e6bc63e9863ef212d9", 0x18}], 0x7, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000340)={r3, @in6={{0xa, 0x0, 0x8001, @remote, 0x5}}, 0x5, 0x5, 0xffffffc1, 0x0, 0xffffffff}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x4e20, 0xfffff801, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x46}}, 0x7, 0x91a, 0x2, 0x200, 0xa8}, 0x98) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x2, [0x0, 0x0]}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000080)=r4, 0x4) [ 553.211158][T23666] fuse: blksize only supported for fuseblk [ 553.265871][T23666] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 553.275032][T23666] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x600}, 0x1c) 01:15:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x43210}, 0x1c) 01:15:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) inotify_init() r1 = socket$inet(0x10, 0x2, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r2, 0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000240)={{0x1, 0x0, @identifier="8bbd52b8d0be1a2fa6a1e8c3a9c6754b"}, 0x32, [], "16919853fd6dc65fcbdb870c8a2ff126839f2fc9386df3dac3524a5ffc6169b71d35004199c851ebe8dc17a3980a2a85dd43"}) [ 553.660035][T23682] fuse: blksize only supported for fuseblk [ 553.677070][T23682] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 553.691186][T23682] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x700}, 0x1c) 01:15:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 01:15:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) inotify_init() r1 = socket$inet(0x10, 0x2, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r2, 0xffffffffffffffff) 01:15:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x900}, 0x1c) [ 553.937559][T23694] fuse: blksize only supported for fuseblk [ 553.964127][T23694] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 554.033413][T23694] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:33 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) 01:15:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r3, 0xffffffffffffffff) r4 = fcntl$getown(r3, 0x9) write$P9_RGETLOCK(r2, &(0x7f0000000180)={0x25, 0x37, 0x1, {0x0, 0x3, 0x0, r4, 0x7, 'user_id'}}, 0x25) 01:15:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xa00}, 0x1c) 01:15:33 executing program 5: creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') times(&(0x7f0000000280)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000002c0)={0x7f, 0x1, 0x5, 0x4, 0x5, 0x0, 0x5, 0x6a, 0x1, 0x1e, 0xff}, 0xb) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="fffff21f00199ebc8cdec24a10d2f200d8a7dbcc5adc911d4835363047fcc88dad9ea3e2", @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d34e87f5b303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cbb5561442e763365127adc21da"]) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) inotify_init() r1 = socket$inet(0x10, 0x2, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r2, 0xffffffffffffffff) [ 554.419920][T23721] fuse: blksize only supported for fuseblk [ 554.464396][T23723] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 554.491285][T23723] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x50000}, 0x1c) 01:15:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xd90}, 0x1c) 01:15:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r3, 0xffffffffffffffff) r4 = fcntl$getown(r3, 0x9) write$P9_RGETLOCK(r2, &(0x7f0000000180)={0x25, 0x37, 0x1, {0x0, 0x3, 0x0, r4, 0x7, 'user_id'}}, 0x25) 01:15:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) inotify_init() r1 = socket$inet(0x10, 0x2, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r2, 0xffffffffffffffff) [ 554.530486][T23720] fuse: Unknown parameter '' 01:15:33 executing program 5: creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') times(&(0x7f0000000280)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000002c0)={0x7f, 0x1, 0x5, 0x4, 0x5, 0x0, 0x5, 0x6a, 0x1, 0x1e, 0xff}, 0xb) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="fffff21f00199ebc8cdec24a10d2f200d8a7dbcc5adc911d4835363047fcc88dad9ea3e2", @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d34e87f5b303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cbb5561442e763365127adc21da"]) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 554.669398][T23733] fuse: blksize only supported for fuseblk [ 554.685657][T23733] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 01:15:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xdd8}, 0x1c) [ 554.716729][T23733] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) inotify_init() r1 = socket$inet(0x10, 0x2, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 554.893519][T23743] fuse: Unknown parameter '' 01:15:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xde0}, 0x1c) 01:15:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r3, 0xffffffffffffffff) r4 = fcntl$getown(r3, 0x9) write$P9_RGETLOCK(r2, &(0x7f0000000180)={0x25, 0x37, 0x1, {0x0, 0x3, 0x0, r4, 0x7, 'user_id'}}, 0x25) [ 554.975195][T23747] fuse: blksize only supported for fuseblk [ 554.990829][T23745] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 555.011173][T23745] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:34 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) shutdown(r1, 0x1) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:34 executing program 5: creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') times(&(0x7f0000000280)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000002c0)={0x7f, 0x1, 0x5, 0x4, 0x5, 0x0, 0x5, 0x6a, 0x1, 0x1e, 0xff}, 0xb) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="fffff21f00199ebc8cdec24a10d2f200d8a7dbcc5adc911d4835363047fcc88dad9ea3e2", @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d34e87f5b303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cbb5561442e763365127adc21da"]) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe00}, 0x1c) [ 555.360990][T23767] fuse: Unknown parameter '' 01:15:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x142800}, 0x1c) 01:15:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) inotify_init() r1 = socket$inet(0x10, 0x2, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) socket$inet6_tcp(0xa, 0x1, 0x0) 01:15:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r2, 0xffffffffffffffff) fcntl$getown(r2, 0x9) 01:15:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x1500}, 0x1c) 01:15:34 executing program 5: creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') times(&(0x7f0000000280)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000002c0)={0x7f, 0x1, 0x5, 0x4, 0x5, 0x0, 0x5, 0x6a, 0x1, 0x1e, 0xff}, 0xb) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="fffff21f00199ebc8cdec24a10d2f200d8a7dbcc5adc911d4835363047fcc88dad9ea3e2", @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d34e87f5b303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cbb5561442e763365127adc21da"]) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 555.560794][T23774] fuse: blksize only supported for fuseblk [ 555.579994][T23774] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 01:15:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x1802}, 0x1c) [ 555.613975][T23774] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r2, 0xffffffffffffffff) 01:15:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) inotify_init() r1 = socket$inet(0x10, 0x2, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) socket$inet6_tcp(0xa, 0x1, 0x0) 01:15:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x2000}, 0x1c) [ 555.810345][T23788] fuse: Unknown parameter '' [ 555.826442][T23789] fuse: blksize only supported for fuseblk 01:15:35 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) exit(0x40000000000002) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000000)=0x9) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) inotify_init() r1 = socket$inet(0x10, 0x2, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) socket$inet6_tcp(0xa, 0x1, 0x0) 01:15:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x2ee0}, 0x1c) [ 556.090724][T23801] fuse: blksize only supported for fuseblk 01:15:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x17c286}, 0x1c) 01:15:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r2, 0xffffffffffffffff) fcntl$getown(r2, 0x9) 01:15:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x3f00}, 0x1c) 01:15:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) inotify_init() r1 = socket$inet(0x10, 0x2, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 01:15:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x4000}, 0x1c) [ 556.444827][T23817] fuse: blksize only supported for fuseblk 01:15:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) inotify_init() r1 = socket$inet(0x10, 0x2, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fff, 0x0) [ 556.599407][ C0] net_ratelimit: 22 callbacks suppressed [ 556.599419][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 556.643849][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 556.672010][T23832] fuse: blksize only supported for fuseblk 01:15:36 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f00000004c0)={[], 0xfff7, 0x96, 0x5, 0x0, 0x2003, 0x8000, 0x3000, [], 0x40}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:36 executing program 5: creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') times(&(0x7f0000000280)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000002c0)={0x7f, 0x1, 0x5, 0x4, 0x5, 0x0, 0x5, 0x6a, 0x1, 0x1e, 0xff}, 0xb) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="fffff21f00199ebc8cdec24a10d2f200d8a7dbcc5adc911d4835363047fcc88dad9ea3e2", @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d34e87f5b303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cbb5561442e763365127adc21da"]) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) inotify_init() r1 = socket$inet(0x10, 0x2, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x4002}, 0x1c) [ 557.008371][T23845] fuse: blksize only supported for fuseblk [ 557.015193][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 557.019269][T23845] validate_nla: 4 callbacks suppressed [ 557.019277][T23845] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 557.051901][T23845] __nla_validate_parse: 4 callbacks suppressed [ 557.051910][T23845] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 557.199483][T23843] fuse: Unknown parameter '' 01:15:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x20c49a}, 0x1c) 01:15:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x7fdc}, 0x1c) 01:15:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) inotify_init() r1 = socket$inet(0x10, 0x2, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0xf5ffffff, @loopback}, 0x1c) [ 557.417923][T23862] fuse: blksize only supported for fuseblk [ 557.424285][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 557.436117][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 557.439147][T23862] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 557.448958][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x80000002) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 557.465619][T23862] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x80fe}, 0x1c) [ 557.622867][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x900d}, 0x1c) 01:15:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) inotify_init() sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000340)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f1a9076fc303030303030303030703030303030303034303030300c757365725fe9ad74", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) accept4$llc(r2, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000100)=0x10, 0x81000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='\x18\x9a\xa3*wl\xf9\xea0\xd5\xeef\xcf\xb3\xfe\x01\xf2\x12\xe3\x06\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x200600) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x7) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r5, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r5, 0xffffffffffffffff) dup2(r4, r5) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000240)={0x2, 0x0, &(0x7f0000ffa000/0x3000)=nil}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 557.939190][T23884] fuse: blksize only supported for fuseblk [ 557.947634][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 557.984687][T23888] fuse: Unknown parameter 'rootmov000000000p000000040000 user_t00000000000000000000' 01:15:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x281400}, 0x1c) 01:15:37 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) pwritev(r1, &(0x7f0000000740)=[{&(0x7f0000000280)}, {0x0}, {0x0}, {&(0x7f0000000540)}, {&(0x7f0000000140)="d82a63a67db0905d22216f988ad69a815ee05bb5fc3b0679b423b1", 0x1b}, {&(0x7f00000006c0)}, {&(0x7f00000001c0)="9429b5b50cb5d7ad4c7bee7c7ce353e6bc63e9863ef212d9", 0x18}], 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r3, 0x4008ae48, &(0x7f0000000080)=0x10000) ioctl$NBD_CLEAR_QUE(r2, 0xab05) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000340)={r4, @in6={{0xa, 0x0, 0x8001, @remote, 0x5}}, 0x5, 0x5, 0xffffffc1, 0x0, 0xffffffff}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={r4, 0x7}, 0xc) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) inotify_init() sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xb8ff}, 0x1c) 01:15:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000340)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f1a9076fc303030303030303030703030303030303034303030300c757365725fe9ad74", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) accept4$llc(r2, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000100)=0x10, 0x81000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='\x18\x9a\xa3*wl\xf9\xea0\xd5\xeef\xcf\xb3\xfe\x01\xf2\x12\xe3\x06\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4429ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f579bc422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0d610768514756f12fd854b0dcb91df54268d87b419ae2c0babc9ea3b098c44fbd2b252d9a89543b9b299f04b2796f19fca4126547a0373e7074448f6926aae9194b9cfe9bdaf615d9b895e1ef28e7dba4569c63582da7c9154a84f82a99d4e33fff0d14e7ad0ea0068d59c29"], 0x200600) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x7) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r5, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r5, 0xffffffffffffffff) dup2(r4, r5) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000240)={0x2, 0x0, &(0x7f0000ffa000/0x3000)=nil}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x80000040) [ 558.236160][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xc0fe}, 0x1c) [ 558.303946][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 558.310437][T23897] fuse: blksize only supported for fuseblk [ 558.363282][T23900] fuse: Unknown parameter 'rootmov000000000p000000040000 user_t00000000000000000000' 01:15:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) inotify_init() sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xd80d}, 0x1c) 01:15:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000340)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f1a9076fc303030303030303030703030303030303034303030300c757365725fe9ad74", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) accept4$llc(r2, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000100)=0x10, 0x81000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='\x18\x9a\xa3*wl\xf9\xea0\xd5\xeef\xcf\xb3\xfe\x01\xf2\x12\xe3\x06\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x200600) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x7) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r5, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r5, 0xffffffffffffffff) dup2(r4, r5) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000240)={0x2, 0x0, &(0x7f0000ffa000/0x3000)=nil}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 558.563307][T23917] fuse: blksize only supported for fuseblk 01:15:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) r1 = socket$inet(0x10, 0x2, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 558.669726][T23924] fuse: Unknown parameter 'rootmov000000000p000000040000 user_t00000000000000000000' [ 558.756600][T23928] fuse: blksize only supported for fuseblk [ 558.779478][T23928] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 558.802883][T23928] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x770000}, 0x1c) 01:15:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xdc7f}, 0x1c) 01:15:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x24802}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:38 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000200)) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r4, 0x5421, &(0x7f0000000240)=0x7) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r5, 0x5421, &(0x7f0000000240)=0x7) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x9, 0x9, 0x8}) r6 = accept4$x25(r1, &(0x7f0000000000), &(0x7f0000000140)=0x629, 0x80800) accept4$x25(r6, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x80000) exit(0x68) r7 = request_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f00000001c0)='#\'@cgroup^eth0lomime_type\x00', 0x0) keyctl$get_persistent(0x16, 0xee01, r7) [ 559.218208][T23943] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 559.227239][T23943] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe00d}, 0x1c) 01:15:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x61, 0x0, 0x1, "132a8473e5925e3d5f3e74e9987ae58f", "0c011b54abd2f7015c9acf4afd1fe68f767a22cbed2844f90d6834467680047ecaf4768fb317488b79428ab97e718316bd028f4ee9c665084cd3885b5e2a7ba7b743b16d7d62182dd5d267b4"}, 0x61, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x80000) creat(&(0x7f0000000100)='./file0\x00', 0x58) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) 01:15:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe02e}, 0x1c) [ 559.476968][T23956] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 559.496058][T23956] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x1000000}, 0x1c) 01:15:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe803}, 0x1c) 01:15:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x61, 0x0, 0x1, "132a8473e5925e3d5f3e74e9987ae58f", "0c011b54abd2f7015c9acf4afd1fe68f767a22cbed2844f90d6834467680047ecaf4768fb317488b79428ab97e718316bd028f4ee9c665084cd3885b5e2a7ba7b743b16d7d62182dd5d267b4"}, 0x61, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x80000) creat(&(0x7f0000000100)='./file0\x00', 0x58) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) 01:15:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:39 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0xfff) socket$kcm(0x29, 0x5, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000000)={0x2, 0x7}) [ 560.133457][T23981] fuse: Bad value for 'fd' [ 560.143635][T23977] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 560.171158][T23977] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xf401}, 0x1c) 01:15:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x61, 0x0, 0x1, "132a8473e5925e3d5f3e74e9987ae58f", "0c011b54abd2f7015c9acf4afd1fe68f767a22cbed2844f90d6834467680047ecaf4768fb317488b79428ab97e718316bd028f4ee9c665084cd3885b5e2a7ba7b743b16d7d62182dd5d267b4"}, 0x61, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x80000) creat(&(0x7f0000000100)='./file0\x00', 0x58) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) [ 560.362222][T23996] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 560.371554][T23995] fuse: Bad value for 'fd' [ 560.384304][T23996] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xfc00}, 0x1c) 01:15:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000480)='./file0\x00', 0x80000040) [ 560.547223][T24007] fuse: Bad value for 'fd' 01:15:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x2000000}, 0x1c) 01:15:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xfe80}, 0x1c) 01:15:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:40 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x200600) ioctl$int_in(r1, 0x5421, &(0x7f0000000240)=0x7) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000000)={0x9, 0x3, 0x2, 0x6f47, 0xf, 0x3, 0x3, 0xfa, 0x7, 0x6, 0x8, 0x5}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:40 executing program 4: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x100, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/\xac8o\xee\x1b\xf1s\xbeead-self/\xad\xd4\x1d\xc8Z\xa4\x03qc\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r2 = signalfd4(r1, &(0x7f0000000040)={0x293}, 0xfffffffffffffce3, 0x80000) lseek(r2, 0xfff, 0x1) exit(0x80000020) write$P9_RMKDIR(r0, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) setsockopt$RDS_CANCEL_SENT_TO(r3, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) 01:15:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xfec0}, 0x1c) [ 561.045458][T24021] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 561.064831][T24021] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:40 executing program 2: r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xfe80}, 0x1c) 01:15:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xff00}, 0x1c) 01:15:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) [ 561.286881][T24038] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 561.354487][T24038] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xff0f}, 0x1c) 01:15:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x101}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100)="7247b667a76ea092e32f9b46ce2d412ca06f8586375b9b6e7a8c91cd02c904181cfa964b26d116b8a1abe112950ab782336ad447210e4179101d8d6d9d861c2e880f3ad82568ba7be7951dfda16ef39f5668e59fce063479ecb75b52d70808d5b641c678a316045d42", 0x69, r0}, 0x68) inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:40 executing program 2: r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:40 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x3000000}, 0x1c) 01:15:40 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) accept$netrom(r1, &(0x7f0000000000)={{0x3, @rose}, [@default, @default, @rose, @remote, @rose, @default, @rose]}, &(0x7f0000000080)=0x48) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:41 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/237, 0xed) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000140)=""/11, &(0x7f00000001c0)=0xb) exit(0x0) [ 561.960811][T24061] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 561.973914][ C0] net_ratelimit: 18 callbacks suppressed [ 561.973926][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 561.994682][T24061] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xffb8}, 0x1c) 01:15:41 executing program 2: r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 562.055589][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:41 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:41 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x4aab09aa2bdbadb6) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000100)={0x0, 0x0, [], @bt={0x400, 0x7fff, 0x8000, 0x5, 0x7fff, 0x5, 0x2, 0x1}}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 562.214206][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 562.232910][T24080] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 01:15:41 executing program 0: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x20000}, 0x1c) [ 562.264805][T24080] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:41 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 562.400034][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x900d, @loopback}, 0x1c) 01:15:41 executing program 0: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) [ 562.488125][T24097] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 562.537644][T24097] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 562.573190][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x4000000}, 0x1c) 01:15:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x50000}, 0x1c) [ 562.842318][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 562.856144][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:42 executing program 0: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r1 = fanotify_init(0x200, 0x0) fanotify_mark(r1, 0x1, 0x4800003e, r0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:42 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x76435}, 0x1c) [ 563.015981][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 563.019777][T24122] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 01:15:42 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x20c49a}, 0x1c) [ 563.082219][T24122] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:42 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 563.158459][T24129] fuse: Bad value for 'fd' 01:15:42 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r1 = socket$netlink(0x10, 0x3, 0x15) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000007c0)={0x100, r2, 0x1, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'n\x00\x02\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}]}, 0x100}}, 0x0) r3 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x7fffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00', r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r3, 0x0, 0x16, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', r4}, 0x30) r6 = getpgid(0x0) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x88, r2, 0x13, 0x70bd2b, 0x25dfdbfe, {}, [{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8a, r5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8a, r6}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8b, 0x3}}]}, 0x88}, 0x1, 0x0, 0x0, 0x8080}, 0x20004080) r7 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r7, 0x0, 0x0) [ 563.213743][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:42 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x1000000}, 0x1c) [ 563.287809][T24136] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 563.320356][T24136] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 563.421129][T24145] fuse: Bad value for 'fd' [ 563.438369][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x5000000}, 0x1c) 01:15:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r1 = fanotify_init(0x200, 0x0) fanotify_mark(r1, 0x1, 0x4800003e, r0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:42 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x2000000}, 0x1c) [ 563.692753][T24152] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 563.718036][T24159] fuse: Bad value for 'fd' [ 563.722803][T24152] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x3000000}, 0x1c) 01:15:42 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x4000000}, 0x1c) [ 563.917574][T24171] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 563.935762][T24171] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:43 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x48000, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x7, 0x80000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000000c0)={0x7, 0xf9}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x4000) write$P9_RMKDIR(r1, 0x0, 0x13616d20774bb924) 01:15:43 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 564.192060][T24184] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 564.214382][T24184] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x6000000}, 0x1c) 01:15:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r1 = fanotify_init(0x200, 0x0) fanotify_mark(r1, 0x1, 0x4800003e, r0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x5000000}, 0x1c) 01:15:43 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x6000000}, 0x1c) [ 564.601212][T24196] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 564.621553][T24196] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:43 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x7000000}, 0x1c) [ 564.852505][T24209] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 564.860721][T24209] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:44 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") getsockopt$nfc_llcp(r1, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x2ee0, @loopback}, 0x1c) 01:15:44 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x7000000}, 0x1c) 01:15:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x8000000}, 0x1c) 01:15:44 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x200, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x288300, 0x80) syz_open_dev$usbfs(&(0x7f0000000840)='/dec/bus/usb/00#03\x00', 0x554c, 0x3) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={{}, {0x77359400}}) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x0, 0x0, 0x0, 0x1}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r7, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r7, 0x5421, &(0x7f0000000240)=0x7) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gr\a\x00\x00\x00id=', @ANYRES16=r7, @ANYBLOB=',\x00']) connect$l2tp(r0, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x1, 0x1, 0x1, 0x2}}, 0x2e) r8 = inotify_init() inotify_add_watch(r8, &(0x7f0000000480)='./file0\x00', 0x80000040) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r9, 0x5421, &(0x7f0000000240)=0x7) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r9, 0x84, 0xf, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @rand_addr=0xf1}}, 0x0, 0x8, 0x8, 0x6, 0x7fff}, &(0x7f0000000580)=0x98) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r7, 0x84, 0x73, &(0x7f00000005c0)={r10, 0xe, 0x30, 0xa02}, &(0x7f0000000600)=0x18) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:44 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 565.457914][T24234] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 565.472913][T24234] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:44 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x9000000}, 0x1c) [ 565.701326][T24256] fuse: Unknown parameter 'gr' 01:15:45 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xa000000}, 0x1c) 01:15:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:45 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x80000001, @remote, 0x7}}, 0x8, 0x8001}, 0xfffffffffffffffe) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x7) r4 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="04d80adce20f9259329568b6080100ec"}, {0x2, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}, r6}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r6, 0x1ff}}, 0x10) msgget$private(0x0, 0x490) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) fsetxattr(r2, &(0x7f0000000000)=@known='system.advise\x00', &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x1c, 0xcdf3192a3a5a30ca) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x8000000}, 0x1c) 01:15:45 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe000000}, 0x1c) 01:15:45 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f05705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$inet_udplite(0x2, 0x2, 0x88) accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x141000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x0) inotify_add_watch(r1, 0x0, 0x200) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:45 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 566.542121][T24286] fuse: Unknown parameter 'grop_id' 01:15:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x146063c2}, 0x1c) 01:15:45 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f05705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$inet_udplite(0x2, 0x2, 0x88) accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x141000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x0) inotify_add_watch(r1, 0x0, 0x200) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) [ 566.686255][T24292] fuse: Bad value for 'fd' 01:15:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x15000000}, 0x1c) [ 566.844136][T24299] fuse: Unknown parameter 'grop_id' 01:15:46 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x102, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000080)={0x0, 0x401, 0x4, &(0x7f0000000040)=0x4}) 01:15:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x9000000}, 0x1c) 01:15:46 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000480)='./file0\x00', 0x80000040) [ 567.277690][ C0] net_ratelimit: 18 callbacks suppressed [ 567.277702][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x18020000}, 0x1c) 01:15:46 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f05705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$inet_udplite(0x2, 0x2, 0x88) accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x141000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x0) inotify_add_watch(r1, 0x0, 0x200) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:46 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101000, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040)={0x0, 0x7f}, 0x2) exit(0xfffffffffffffffd) write$P9_RMKDIR(r0, 0x0, 0x0) [ 567.383242][T24322] fuse: Bad value for 'fd' [ 567.404426][T24327] __nla_validate_parse: 2 callbacks suppressed [ 567.404446][T24327] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.2'. [ 567.424559][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 567.435186][T24326] fuse: Unknown parameter 'grop_id' 01:15:46 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x1cdf1fd6}, 0x1c) [ 567.482194][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:46 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f05705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$inet_udplite(0x2, 0x2, 0x88) accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x141000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x0) inotify_add_watch(r1, 0x0, 0x200) [ 567.547625][T24335] fuse: Bad value for 'fd' 01:15:46 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x2, 0x6) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 567.656213][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 567.711541][T24342] fuse: Invalid rootmode [ 567.739109][T24344] fuse: Unknown parameter 'grop_id' 01:15:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x20000000}, 0x1c) [ 567.862170][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xa000000}, 0x1c) 01:15:47 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x2, 0x6) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:47 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f05705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$inet_udplite(0x2, 0x2, 0x88) accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x141000, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x0) 01:15:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x35640700}, 0x1c) 01:15:47 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000000)) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x3f000000}, 0x1c) [ 568.327258][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 568.341873][T24365] fuse: Invalid rootmode 01:15:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x2, 0x6) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 568.382498][T24367] fuse: Unknown parameter 'grop_id' [ 568.394874][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:47 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:47 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f05705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$inet_udplite(0x2, 0x2, 0x88) accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x141000, 0x0) 01:15:47 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) [ 568.492266][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 568.522228][T24381] fuse: Invalid rootmode 01:15:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x40000000}, 0x1c) [ 568.687391][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 568.695812][T24388] fuse: Unknown parameter 'grop_id' 01:15:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe000000}, 0x1c) 01:15:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:48 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x40020000}, 0x1c) 01:15:48 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f05705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$inet_udplite(0x2, 0x2, 0x88) accept$alg(0xffffffffffffffff, 0x0, 0x0) 01:15:48 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x251) ioctl$int_in(r1, 0x5421, &(0x7f0000000240)=0x7) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) write$P9_RMKDIR(r0, 0x0, 0x0) [ 569.159118][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 569.261840][T24407] fuse: Unknown parameter 'grop_id' 01:15:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x801001ef}, 0x1c) 01:15:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:48 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f05705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$inet_udplite(0x2, 0x2, 0x88) accept$alg(0xffffffffffffffff, 0x0, 0x0) 01:15:48 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x8dffffff}, 0x1c) [ 569.472296][T24421] fuse: Unknown parameter 'grop_id' 01:15:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xf000000}, 0x1c) 01:15:49 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) inotify_init() inotify_add_watch(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:49 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f05705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$inet_udplite(0x2, 0x2, 0x88) 01:15:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x900d0000}, 0x1c) 01:15:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:49 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) r2 = socket$netlink(0x10, 0x3, 0x0) pwritev(r2, &(0x7f0000000740)=[{&(0x7f0000000280)}, {0x0}, {0x0}, {&(0x7f0000000540)}, {&(0x7f0000000140)="d82a63a67db0905d22216f988ad69a815ee05bb5fc3b0679b423b1", 0x1b}, {&(0x7f00000006c0)}, {&(0x7f00000001c0)="9429b5b50cb5d7ad4c7bee7c7ce353e6bc63e9863ef212d9", 0x18}], 0x7, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000340)={r3, @in6={{0xa, 0x0, 0x8001, @remote, 0x5}}, 0x5, 0x5, 0xffffffc1, 0x0, 0xffffffff}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x1, 0x33d, 0x800c, 0x5, 0x6, 0x325, 0xef, 0x3f, r3}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r4, 0x7, 0x280000}, &(0x7f0000000140)=0xc) 01:15:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x9ac42000}, 0x1c) [ 570.222860][T24447] fuse: Unknown parameter 'grop_id' 01:15:49 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) inotify_init() inotify_add_watch(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x80000040) 01:15:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:49 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f05705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 01:15:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xb8ff0000}, 0x1c) 01:15:49 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) inotify_init() inotify_add_watch(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x80000040) [ 570.564606][T24469] fuse: Unknown parameter 'grop_id' 01:15:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xc2636014}, 0x1c) 01:15:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x10320400}, 0x1c) 01:15:50 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000000)={0x9d, 0x5}) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x68a8c0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000080)={{0x7f, 0x4}, {0x80, 0x20}, 0x7ff, 0x1, 0x3}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x7) ioctl$VIDIOC_ENUMAUDIO(r3, 0xc0345641, &(0x7f0000000100)={0x401, "60a347005ec22276f799b44f209cd04364d57a43675e0ca6938fb5f76b39f3f6", 0x1, 0x1}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r4, 0x5421, &(0x7f0000000240)=0x7) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, &(0x7f0000000380)={r6, 0x2}) ioctl$DRM_IOCTL_DMA(r4, 0xc0406429, &(0x7f0000000340)={r6, 0x5, &(0x7f0000000140)=[0x644, 0xfff, 0x6, 0x1f, 0x8], &(0x7f0000000200)=[0x9, 0x0, 0x9, 0x7fffffff, 0x5], 0x1, 0x1, 0x4, &(0x7f00000002c0)=[0x5], &(0x7f0000000300)=[0x9]}) 01:15:50 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, 0x0, 0x80000040) 01:15:50 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) 01:15:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xc2ffffff}, 0x1c) 01:15:50 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) 01:15:50 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, 0x0, 0x80000040) 01:15:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xc4ffffff}, 0x1c) 01:15:50 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, 0x0, 0x80000040) 01:15:50 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) 01:15:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x10625e5c}, 0x1c) 01:15:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xd61fdf1c}, 0x1c) 01:15:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:50 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x0) 01:15:50 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) 01:15:50 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040), 0x2) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xd80d0000}, 0x1c) 01:15:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:51 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x0) 01:15:51 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:15:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xdc7f0000}, 0x1c) 01:15:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 572.340327][ C0] net_ratelimit: 17 callbacks suppressed [ 572.340338][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x11000000}, 0x1c) 01:15:51 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x0) 01:15:51 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:15:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe00d0000}, 0x1c) 01:15:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:51 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x181400, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) [ 572.922561][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe02e0000}, 0x1c) [ 572.970510][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 573.069323][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe8030000}, 0x1c) 01:15:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x8dffffff}, 0x1c) [ 573.236736][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 573.310074][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x18020000}, 0x1c) 01:15:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:15:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xef011080}, 0x1c) 01:15:52 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r1, 0x5421, &(0x7f0000000240)=0x7) getsockopt$bt_hci(r1, 0x0, 0x1, &(0x7f0000000000)=""/11, &(0x7f0000000040)=0xb) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000080)={{0x3, 0x0, @identifier="797dd39b6c12b445a176a85723c0d27c"}}) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 573.820592][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 573.841159][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 573.856402][T24614] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.0'. 01:15:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xf4010000}, 0x1c) 01:15:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a2", 0xe}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:53 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:15:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) migrate_pages(r2, 0x8, &(0x7f0000000100)=0x8001, &(0x7f0000000140)) inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:15:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xf5ffffff}, 0x1c) [ 574.057340][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 574.251996][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x1a000000}, 0x1c) 01:15:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a2", 0xe}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:53 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:15:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xfc000000}, 0x1c) 01:15:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="64653d3030303030303040c022827657bfca302c8492076bfbe322017365725f69643d00001000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./file0\x00', 0x2) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:53 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='oU/t\x00read-sel\x01q\xd1\xfa\xa0\x00\x00\x00\x00\x00\t\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xfe800000}, 0x1c) 01:15:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a2", 0xe}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 574.780100][T24654] fuse: Bad value for 'fd' 01:15:53 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:15:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="64653d3030303030303040c022827657bfca302c8492076bfbe322017365725f69643d00001000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./file0\x00', 0x2) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c", 0x15}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:54 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 574.997695][T24669] fuse: Bad value for 'fd' 01:15:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x1b000000}, 0x1c) 01:15:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xfec00000}, 0x1c) 01:15:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="64653d3030303030303040c022827657bfca302c8492076bfbe322017365725f69643d00001000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./file0\x00', 0x2) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:15:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c", 0x15}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:54 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:15:54 executing program 4: getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x2) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000001c0)=0x16, 0x4) 01:15:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xff000000}, 0x1c) 01:15:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c", 0x15}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:54 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 575.777988][T24689] fuse: Bad value for 'fd' 01:15:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000", 0x18}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:54 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:15:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xff0f0000}, 0x1c) 01:15:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x20000000}, 0x1c) 01:15:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="64653d3030303030303040c022827657bfca302c8492076bfbe322017365725f69643d00001000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./file0\x00', 0x2) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:15:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000", 0x18}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:55 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:15:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xffffff8d}, 0x1c) 01:15:55 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200000, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='veno\x00', 0x5) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r1, 0x0, 0x0) [ 576.562345][T24724] fuse: Bad value for 'fd' 01:15:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000", 0x18}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:55 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:15:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xffffffc2}, 0x1c) 01:15:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="64653d3030303030303040c022827657bfca302c8492076bfbe322017365725f69643d00001000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./file0\x00', 0x2) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:15:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c0000000200", 0x1a}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xffffffc4}, 0x1c) [ 576.879030][T24747] fuse: Bad value for 'fd' 01:15:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x3f000000}, 0x1c) 01:15:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c0000000200", 0x1a}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:56 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:15:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xfffffff5}, 0x1c) 01:15:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="64653d3030303030303040c022827657bfca302c8492076bfbe322017365725f69643d00001000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') [ 577.452499][ C0] net_ratelimit: 14 callbacks suppressed [ 577.452510][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 577.528935][T24765] fuse: Bad value for 'fd' [ 577.541506][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:56 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/pZoc/thread-\x91%lf/ahtr/`xeg\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c0000000200", 0x1a}], 0x1}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:56 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:15:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x17) 01:15:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x2031e01c) 01:15:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:15:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(0x0, 0x8001, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 577.848102][T24788] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 577.858332][T24788] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x40000000}, 0x1c) 01:15:57 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:15:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:57 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) userfaultfd(0x80000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x7) accept4$inet(r3, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x800) 01:15:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') [ 578.357011][T24798] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 578.362702][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 578.384744][T24798] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 578.398779][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:57 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r1, 0x5421, &(0x7f0000000240)=0x7) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000001c0)) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:57 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:15:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x389002) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000340)) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000810012651d5bd50000000000000008b779220ccb9dfdd82755285805c3dbfa975ec1482aa787094f4b0c6f3ce3d715b70e2794b23aafa2895c2a04e723fa910f200931549fe8ac3d42cbf63b8e88adf725492c3be7a01ed9660e7caa78a57c55e91bc0ce903abf13c9613b1510edf933a80b85253305f943eba762afce887fdd64267d277906214ba226dc62df1b2ebbd90e5d63e84f1d5d0939578df5523d9662"], 0x6) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) r4 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r4, 0x1269, 0x0) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r4, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x100, 0x20, 0xffffffff, 0x0, 0x8}) bind$inet6(r4, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r3, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000080)={0x9, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x484800, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000140)={@remote, 0x1ff, 0x0, 0x0, 0x5, 0x9, 0x1ff}, &(0x7f0000000180)=0x20) 01:15:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') [ 578.482173][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x2002) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket$caif_stream(0x25, 0x1, 0x3) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:15:57 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 578.674320][T24823] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 578.683343][T24823] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x40020000}, 0x1c) 01:15:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:15:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 01:15:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r3, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e22, @multicast1}, 0x10) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r1, 0x5421, &(0x7f0000000240)=0x7) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000000)=0x6e) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x14000000, 0x4) bind$inet6(r4, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x2a}}, 0x1c) listen(r4, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0x1, 0x40003c72, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x400000}, 0x1c) 01:15:58 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 579.324755][T24841] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 579.349104][T24841] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:58 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0xa0000) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 01:15:58 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:15:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:15:58 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r2, 0x6, 0x11, &(0x7f0000000080)=0x1, 0x110) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) sendto$inet6(r0, &(0x7f0000000000)="b4", 0x1, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x4000, @mcast2, 0x35d}, 0x1c) [ 579.420574][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, &(0x7f0000000040)) 01:15:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001500)='/dev/dlm-monitor\x00', 0x8000, 0x0) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000001580)={0x6, &(0x7f0000001540)=[{0x7fff, 0x1f, 0x0, 0x8}, {0x4, 0x40, 0x40}, {0x0, 0x6, 0x7f, 0x6}, {0x9, 0x6, 0x4, 0x1400000}, {0x1, 0xd3, 0x6, 0x1000}, {0x9, 0x1, 0x5, 0x5}]}, 0x10) munlockall() bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x487e, 0x2c243) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r4, 0xffffffffffffffff) fsetxattr$trusted_overlay_opaque(r4, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x4) 01:15:58 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') [ 579.639340][T24865] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 579.669201][T24865] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 579.678421][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 579.700068][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x40790000}, 0x1c) 01:15:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:15:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, &(0x7f0000000040)) 01:15:59 executing program 0: mkdir(0x0, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:15:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xd, &(0x7f0000000000)=0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000040)=0x5, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x6e22, 0x4, @mcast2, 0x20000000}, 0x73b935692291ad2e) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 580.185252][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 580.224446][T24877] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 580.252044][T24877] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 580.339092][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:15:59 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) 01:15:59 executing program 0: mkdir(0x0, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:15:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1b0000001200030207fffd9492a28308070019006c000000020085", 0x1b}], 0x1}, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) 01:15:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:15:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:15:59 executing program 0: mkdir(0x0, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') [ 580.496682][T24899] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 580.532570][T24899] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 01:15:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x101440) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) [ 580.705180][T24912] vivid-000: ================= START STATUS ================= [ 580.717388][T24912] v4l2-ctrls: vivid-000: Test Pattern: 75% Colorbar [ 580.732924][T24912] v4l2-ctrls: vivid-000: Fill Percentage of Frame: 100 [ 580.739990][T24912] v4l2-ctrls: vivid-000: Horizontal Movement: No Movement [ 580.756140][T24912] v4l2-ctrls: vivid-000: Vertical Movement: No Movement [ 580.766264][T24912] v4l2-ctrls: vivid-000: OSD Text Mode: All [ 580.775384][T24912] v4l2-ctrls: vivid-000: Show Border: false [ 580.784533][T24912] v4l2-ctrls: vivid-000: Show Square: false [ 580.790561][T24912] v4l2-ctrls: vivid-000: Sensor Flipped Horizontally: false [ 580.804257][T24912] v4l2-ctrls: vivid-000: Sensor Flipped Vertically: false [ 580.813768][T24912] v4l2-ctrls: vivid-000: Insert SAV Code in Image: false [ 580.820947][T24912] v4l2-ctrls: vivid-000: Insert EAV Code in Image: false [ 580.830795][T24912] v4l2-ctrls: vivid-000: Reduced Framerate: false [ 580.838731][T24912] v4l2-ctrls: vivid-000: Enable Capture Cropping: true [ 580.848063][T24912] v4l2-ctrls: vivid-000: Enable Capture Composing: true [ 580.856448][T24912] v4l2-ctrls: vivid-000: Enable Capture Scaler: true [ 580.865813][T24912] v4l2-ctrls: vivid-000: Timestamp Source: End of Frame [ 580.874270][T24912] v4l2-ctrls: vivid-000: Colorspace: sRGB [ 580.879983][T24912] v4l2-ctrls: vivid-000: Transfer Function: Default [ 580.889318][T24912] v4l2-ctrls: vivid-000: Y'CbCr Encoding: Default [ 580.897110][T24912] v4l2-ctrls: vivid-000: HSV Encoding: Hue 0-179 [ 580.906431][T24912] v4l2-ctrls: vivid-000: Quantization: Default [ 580.913957][T24912] v4l2-ctrls: vivid-000: Apply Alpha To Red Only: false [ 580.920888][T24912] v4l2-ctrls: vivid-000: Standard Aspect Ratio: 4x3 [ 580.929257][T24912] v4l2-ctrls: vivid-000: DV Timings Signal Mode: Current DV Timings inactive [ 580.938393][T24912] v4l2-ctrls: vivid-000: DV Timings: 640x480p59 inactive [ 580.945551][T24912] v4l2-ctrls: vivid-000: DV Timings Aspect Ratio: Source Width x Height [ 580.953976][T24912] v4l2-ctrls: vivid-000: Maximum EDID Blocks: 2 [ 580.960217][T24912] v4l2-ctrls: vivid-000: Limited RGB Range (16-235): false [ 580.967474][T24912] v4l2-ctrls: vivid-000: Rx RGB Quantization Range: Automatic [ 580.974965][T24912] v4l2-ctrls: vivid-000: Power Present: 0x00000001 [ 580.981514][T24912] tpg source WxH: 640x360 (Y'CbCr) [ 580.986615][T24912] tpg field: 1 [ 580.989966][T24912] tpg crop: 640x360@0x0 [ 580.994172][T24912] tpg compose: 640x360@0x0 [ 580.998573][T24912] tpg colorspace: 8 [ 581.002412][T24912] tpg transfer function: 0/0 [ 581.006990][T24912] tpg Y'CbCr encoding: 0/0 [ 581.011442][T24912] tpg quantization: 0/0 [ 581.015583][T24912] tpg RGB range: 0/2 [ 581.019456][T24912] vivid-000: ================== END STATUS ================== [ 581.030168][T24912] vivid-000: ================= START STATUS ================= [ 581.037949][T24912] v4l2-ctrls: vivid-000: Test Pattern: 75% Colorbar [ 581.044607][T24912] v4l2-ctrls: vivid-000: Fill Percentage of Frame: 100 [ 581.052449][T24912] v4l2-ctrls: vivid-000: Horizontal Movement: No Movement [ 581.059560][T24912] v4l2-ctrls: vivid-000: Vertical Movement: No Movement [ 581.066634][T24912] v4l2-ctrls: vivid-000: OSD Text Mode: All [ 581.072615][T24912] v4l2-ctrls: vivid-000: Show Border: false [ 581.078503][T24912] v4l2-ctrls: vivid-000: Show Square: false [ 581.084449][T24912] v4l2-ctrls: vivid-000: Sensor Flipped Horizontally: false [ 581.091798][T24912] v4l2-ctrls: vivid-000: Sensor Flipped Vertically: false [ 581.098902][T24912] v4l2-ctrls: vivid-000: Insert SAV Code in Image: false [ 581.106084][T24912] v4l2-ctrls: vivid-000: Insert EAV Code in Image: false [ 581.113242][T24912] v4l2-ctrls: vivid-000: Reduced Framerate: false [ 581.119654][T24912] v4l2-ctrls: vivid-000: Enable Capture Cropping: true [ 581.126562][T24912] v4l2-ctrls: vivid-000: Enable Capture Composing: true [ 581.133570][T24912] v4l2-ctrls: vivid-000: Enable Capture Scaler: true [ 581.140253][T24912] v4l2-ctrls: vivid-000: Timestamp Source: End of Frame [ 581.147329][T24912] v4l2-ctrls: vivid-000: Colorspace: sRGB 01:16:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xd, &(0x7f0000000000)=0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000040)=0x5, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x6e22, 0x4, @mcast2, 0x20000000}, 0x73b935692291ad2e) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:00 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(0x0, &(0x7f0000000140)='./file0/file0\x00') 01:16:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x4e000000}, 0x1c) 01:16:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') [ 581.153138][T24912] v4l2-ctrls: vivid-000: Transfer Function: Default [ 581.159728][T24912] v4l2-ctrls: vivid-000: Y'CbCr Encoding: Default [ 581.178220][T24912] v4l2-ctrls: vivid-000: HSV Encoding: Hue 0-179 [ 581.201351][T24912] v4l2-ctrls: vivid-000: Quantization: Default [ 581.218960][T24912] v4l2-ctrls: vivid-000: Apply Alpha To Red Only: false [ 581.237650][T24912] v4l2-ctrls: vivid-000: Standard Aspect Ratio: 4x3 01:16:00 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(0x0, &(0x7f0000000140)='./file0/file0\x00') [ 581.281186][T24912] v4l2-ctrls: vivid-000: DV Timings Signal Mode: Current DV Timings inactive [ 581.301283][T24912] v4l2-ctrls: vivid-000: DV Timings: 640x480p59 inactive [ 581.310911][T24912] v4l2-ctrls: vivid-000: DV Timings Aspect Ratio: Source Width x Height [ 581.320248][T24912] v4l2-ctrls: vivid-000: Maximum EDID Blocks: 2 [ 581.326671][T24912] v4l2-ctrls: vivid-000: Limited RGB Range (16-235): false [ 581.333973][T24912] v4l2-ctrls: vivid-000: Rx RGB Quantization Range: Automatic [ 581.354415][T24912] v4l2-ctrls: vivid-000: Power Present: 0x00000001 [ 581.385889][T24912] tpg source WxH: 640x360 (Y'CbCr) [ 581.405109][T24912] tpg field: 1 [ 581.416848][T24912] tpg crop: 640x360@0x0 01:16:00 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r1, 0x5421, &(0x7f0000000240)=0x7) r2 = fcntl$dupfd(r1, 0x406, r0) r3 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) renameat2(r2, &(0x7f0000000040)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00', 0x6) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r4, 0x0, 0x0) 01:16:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xd, &(0x7f0000000000)=0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000040)=0x5, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x6e22, 0x4, @mcast2, 0x20000000}, 0x73b935692291ad2e) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:16:00 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(0x0, &(0x7f0000000140)='./file0/file0\x00') [ 581.435735][T24912] tpg compose: 640x360@0x0 [ 581.443426][T24912] tpg colorspace: 8 [ 581.447522][T24912] tpg transfer function: 0/0 [ 581.480139][T24912] tpg Y'CbCr encoding: 0/0 [ 581.502942][T24912] tpg quantization: 0/0 01:16:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') [ 581.524236][T24912] tpg RGB range: 0/2 [ 581.543194][T24912] vivid-000: ================== END STATUS ================== 01:16:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r1, 0x5421, &(0x7f0000000240)=0x7) accept4$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14, 0x80000) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c40)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x40, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}, 0x1c, &(0x7f0000000080), 0x0, &(0x7f0000000280)=[@hopopts={{0x38, 0x29, 0x36, {0x1, 0x3, [], [@hao={0xc9, 0x10, @mcast1}, @padn={0x1, 0x2, [0x0, 0x0]}, @ra={0x5, 0x2, 0x101}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x6}}, @rthdrdstopts={{0x88, 0x29, 0x37, {0x5c, 0xd, [], [@jumbo={0xc2, 0x4, 0x7}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @calipso={0x7, 0x10, {0x8001, 0x2, 0x0, 0x0, [0xfffffffffffffffa]}}, @calipso={0x7, 0x38, {0xfffffffc, 0xc, 0x9e, 0x80, [0x5, 0x8000, 0x1, 0x1f, 0x1f, 0x8]}}, @jumbo={0xc2, 0x4, 0x40000}, @ra={0x5, 0x2, 0x20}, @ra={0x5, 0x2, 0x7}, @ra={0x5, 0x2, 0x2}]}}}, @rthdrdstopts={{0xffffffffffffffc8, 0x29, 0x37, {0x8, 0xd, [], [@calipso={0x7, 0x48, {0x9, 0x10, 0x2, 0x8, [0x3, 0x1, 0x6c, 0xfffffffffffffff9, 0x1, 0x8ad6, 0xa2, 0x2]}}, @padn={0x1, 0x1, [0x0]}, @ra={0x5, 0x2, 0x9}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xffffffff}, @jumbo={0xc2, 0x4, 0x5}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, [], 0x16}, r2}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7}}, @dontfrag={{0x14, 0x29, 0x3e, 0x10001}}], 0x1b8}}, {{&(0x7f0000000440)={0xa, 0x4e23, 0x7, @local, 0x80}, 0x1c, &(0x7f0000000940)=[{&(0x7f0000000480)="03", 0x1}, {&(0x7f00000004c0)="caced4415247cef509c5ae", 0xb}, {&(0x7f0000000500)="07fb0b4aeeebdeaa8ccdb290d676", 0xe}, {&(0x7f0000000540)}, {&(0x7f0000000580)="fa7952a5820fcaaccc86d14a03f039d33810ab51dc1e43d488b05182e56edcf9c1a2804180370f7aa5e1ecb18332eef3a0a80eb156ab772ebdd4a223c7723330f61fdb930619b977f38bb15effce482ecfc19686b17cf2ab2d8f9c7570f5b41147edd19c31edf0ababe04fec459d2f77fa38d22e509667d2b3bb5f0fdd1cc7c486018bcc1ee13c892659ad1c13e954584d4737f29b4b33ce952dd5ac874c3e0d1de174097d8e89642f10b6804fb761cdbcf64b93c9bbdcf301c77fe9f4e124e4049bdf94d379cd04caaa09bed1b7b8669ad8", 0xd2}, {&(0x7f0000000680)="2adfe4ef8c95957da2a0924d74cbb575672c63a15b5c17a62aa288fec553f11fbe585b1d16a0c0400d40da7025f194e300058c9507b991e8b3c7353d1487057d76323a999dc49ce53e609b63aeebe7004a70759f", 0x54}, {&(0x7f0000000700)="2fe420686b1dda3c20926d4741286f98a9e1ba9a323e15b4eaada59a66048301d1d91daedb927369bef11c60485138b361533453da9415031e64b8a482120dcd74a1f365130f1c1bed2ded41e850b7f933447fa8afad48d8638870b3eeac62e5980a3e5bc58ae5c06dbd2f7a86240fdb95b9f0adc38453d3ca8d2395f68873e1dc4352842120e6bb9884a8fddbce5522bc7e", 0x92}, {&(0x7f00000007c0)="ccc3b54f22d4ca1f5f9e3d4f107870b02b3e87f512ed69023d546e187a57eb36c51098c5e480fe5447207203bfe6e6c374d75be5f86a42104d109d725f96fbe9fc4723bd6f76e5be999437", 0x4b}, {&(0x7f0000000840)="6e71d1ac1fa3ae8f200ab29e9fc88397baef29637a09106fec00434fb4d0d7ca37e664cd36939f8e7b76a29a5e9df9b3f5a9bd65a83229571c832e377794b52ca88510e9a1829d3d7b1128b8a756b5ac17272e38f578889de8e7199c3ca39b276c6486e5f22262384055d394f33c509bb50893509c53fca89322d5013b2c21382051be5f9e84dbb62e8890cf2957cb3a347aa11debd92634220637820ea9dde8c06f5a0b044fbc38512593fde3d691559972f2bd18a9882f53de2bbb9bbfecf6cbe31dfb134bb7f487867f6f7b5917d4ff723bf75c6931", 0xd7}], 0x9}}, {{&(0x7f0000000a00)={0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000001}, 0x1c, &(0x7f0000001e00)=[{&(0x7f0000000a40)="c7ce5f54d32d53f1359011df996278ac3d828919b0d5dc0a5166809971b25aca1370705681ea31937cb7b8a4e9f55f7995d8cd56716918abb119429dbf032fd7d3b941894081b2bbfcaf84678a85753323ef", 0x52}, {&(0x7f0000000ac0)="8f9ccd76a5cca18829d382cab9a15a1deae92cae34b56cabc33786abb5827a04368b1a506de63d93d7d85d8e66c3d75cb807d3e2d0702fc144e9bc926eab1ce6bb6a5f6673494b29751d320b92a103747a16c6ee0adbddf6877d743feae462de31c354845e29680861bb6332617285caf769a98e0eaa4596ca18a49525eee03f94a6782bf65f9cbb6ae334e864078598729a8957fb651998ab2138d28bee21481a962a85408238078eaa9d9f0acfeb11c6ef24aef216d9926c3768a8e98add257e781fb5eae033b36382d74b7bd29a9120850848", 0xd4}, {&(0x7f0000000bc0)="86dab5981e8288eaae6c20f6a3157c9d24e749a69908dc8d3d582d8c830dfe3a0702147de7712ca1203b6baf02206cf3de6f430ec75b7c695c43016e7a95487b31a8348521698225f1d8d91390293dc5db98c37bd5608659453b1cefe7860086cb0e4e7af8ec03bd8a5162c4388b029a86ddc818f4090261488e417b4808f5e788a48745ebb2e856af8ca145fee383647bdf", 0x92}, {&(0x7f0000000c80)="7b8e80894a95493a77818ba148b68ff825", 0x11}, {&(0x7f0000000cc0)="7ffffdf92a62a7ee2aedeea5d15110185fe564d7c97a3a53eaf2740411bbd2c0cc", 0x21}, {&(0x7f0000000d00)="43d58c4ebbb259bbe034cc09098af1358a903e7159b33e9b82e16140ab38e2e2c79b9f08e64a632344a876d3f061961ac83697283bea0147c6d5e96f9193c000a4428c2e9a9e65f186daf6bd539f8daf4ffa75503912739941c71e5b4120640ad8f76d96a154db4b46c6ffce732da13f13ff0556561c819151742c3e394d53d4fa2fba2e8c7248f691c0030f236b56ca48cd26bb3b115953a3b6f7c25de7ce082a24c08afae6", 0xa6}, {&(0x7f0000000dc0)="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", 0x1000}, {&(0x7f0000001dc0)="78429161c786b72e9915d142aa9c665b4eca3a", 0x13}], 0x8, &(0x7f0000001e80)=[@dontfrag={{0x14}}, @dontfrag={{0x14, 0x29, 0x3e, 0x101}}, @hopopts_2292={{0x30, 0x29, 0x36, {0x1d, 0x2, [], [@hao={0xc9, 0x10, @loopback}, @padn={0x1, 0x2, [0x0, 0x0]}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @tclass={{0x14, 0x29, 0x43, 0xffff}}, @rthdrdstopts={{0x38, 0x29, 0x37, {0x84, 0x3, [], [@calipso={0x7, 0x18, {0x6, 0x4, 0x6, 0x5, [0xfe, 0x2]}}]}}}], 0xc8}}, {{&(0x7f0000001f80)={0xa, 0x4e23, 0x9, @local}, 0x1c, &(0x7f0000002180)=[{&(0x7f0000001fc0)="9fa83ea8c68b4828a478fa867abc70399addbef9eec588ecceddc6e00959103d7d47dd2ac3eddafce10a0b2a4555ee1d553aa45715338b14c690bf5ff80b5e682855b47c3122cf55f33bd26ad1f5095bf0bdf3f7893c069a665bf08e762965fc2756180c1cd6fe5d78ee9800c8267937adea163f4d7c846dd61de76db8da5d4f1bace157f3dd6876c6d26dbf296d8f9219f17cad56b014fda74370b832a3a8d4faf275a4862d40d3e04dc39e3cd9f8cff4d58d05c7eada60f79b2bf98ba3fe063e91806e50ea5c78273ba65dfa0b656c54a19f801d7f394e6d7720f2ddcc", 0xde}, {&(0x7f00000020c0)="236ead3195ff3ecda9b12d2a4e8e933eb3148ff1242ad4b7ebafd3155da48ec6473a4205136fbaef5e5fa4739a7e1fe0f76a24053a8951647c14303949513ab314dd73e4a6d0747cbd045489dae4a9a0dac172215234ca2fe2fe23f6adc36ffbd29c377c6c12147d55269a5bcd98f4c81983ef241a2c3fd4613303df5fd7f2a5c05c2f6a947d6a0f", 0x88}], 0x2}}, {{&(0x7f00000021c0)={0xa, 0x4e21, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffffff7f}, 0x1c, &(0x7f00000024c0)=[{&(0x7f0000002200)="14c73e122bf21c6a5d2c237330257c2eb74c03fb4f7cbe7ce44a58a9e2a03a6dfc43a5cd42f5bd2df00ead86f176ae206685c294823ca2d1e9ca6710647f602b1ff0cae2a425908dabb9f7549242867860ee734f798c0b5afb566155daa4f0444485e9eaf564602e14101053", 0x6c}, {&(0x7f0000002280)="9d59cd493f73ea798fee89a6f84e29723bfcf8cedfa72a80e3f6147ab20a6fc3b924388ef92b09b968c3db08a003b6abb7b260e175987adc90135a3827f158fc4246893063575b1e5ce1c71f69fa6a49da00ee835480a0241d1b4b0d2ed5489eab379d07c14a7a6c43d1b7cee7aec04f9971cf63b94af5f2814b48d50966a4ff053942f1dd34", 0x86}, {&(0x7f0000002340)="a254d1c0cbf38caa8ffcbf49790f544ce37f5631aba255a2956a7bbb434dc2715e99fe8e45252fd71e7540fa858c8359e3403ae6200c063794535cb2e919f31ba6dfa7ae4f17f0e5ce519b02e1fec00fa707b1d5c93fdd", 0x57}, {&(0x7f00000023c0)="d121d5818e06547d26b77effd11892516a20a529a108013ec619887d4cc53e37fa8e7022a5330e62d3ae8f288c55912e5b4f075dc5d9878ab5a083f22778798e793d2f9287f90a31bad7ac16d42f0ec5d70e16aa4308d63afcfb7dd0b89f3fd5ce8ea72d791b5ebc0c655240e78f81fa9ebf557c86f214cd77f27f580fd8a04728c55a9410df0c7aabb2a270c7be8c2e072bc78404bda74dcbfe20f8128a4c86acd69ef1c567fd094d2a924088a8a6140363ff874ffe878553f5b679b6fba56199f6c6e62269ca38a6f08c78", 0xcc}], 0x4, &(0x7f0000002500)=[@hoplimit={{0x14, 0x29, 0x34, 0x9b09}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @rthdr_2292={{0x38, 0x29, 0x39, {0xf5, 0x4, 0x9a188be1772c5b15, 0x0, 0x0, [@local, @dev={0xfe, 0x80, [], 0x11}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x20}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x255a}}], 0x98}}, {{0x0, 0x0, &(0x7f0000002640)=[{&(0x7f00000025c0)="954dba9d64a6865359e8a9bac2eb4808e4043d832e509541bce8c4253e49f3db54c3dd8ba92eaea4ee9b191fe41e476843701d63bf1f32b202864d19338f341d8115509b22043e5e3790d69f6e15fd2529c0c3f3075c8d2b6e105bf9d8dd405dcb3911aa", 0x64}], 0x1, &(0x7f0000003f40)=ANY=[@ANYBLOB="200000000000000029000000370000000100000000000000c20404000000000014000000000000002900000034000000ffff0000fdffffff380000000000000029000000390000008804010300f8ff00ff01000000000000000000000000000100000000000000000000ffff7f0000014b3941f72dbd49"], 0x70}}, {{&(0x7f0000002700)={0xa, 0x4e20, 0x400, @mcast2, 0x6}, 0x1c, &(0x7f0000002980)=[{&(0x7f0000002740)="0053b7ea28b61997eb033eb4d7677b382a2471e7727038e64ba24bb913a77bc3bd3e6ef0e0991b65589b54363f15042ad5ed02433b25f9a33f9c7c91b3fc3137d787e0afc00a2e881f66ff30fcaa64ea21a6405cf340224bd7634a853106367c", 0x60}, {&(0x7f00000027c0)="fea590d24620be89c68d4008b5c0fa809b6596ed567749f775e86a38dc152417457756a4dc4cb9d6b556c46458fc9365143a65469ff2c674b0d8b9044deb4b218688a2ba7a3c2b057d25501954", 0x4d}, {&(0x7f0000002840)="3420b730e6983a6befff1da083862e6f6fb91a416e6fa894ff315a4ab8446a0c9a49ac566278d48238ae5ed9ccf69539b1cd293edd7888c20296ab6ba06d6bef9ab9bca271ca96df96cd9b847f6a1f04c8d096cd", 0x54}, {&(0x7f00000028c0)="f8fe3d996fa56fd8f4fe13ee11ada7ca", 0x10}, {&(0x7f0000002900)="8909ec00e9b0a0ee9e37bcea094a998512c873d5478bf49cb7370d2bbf995e8469a844b27d9316469e2480f23e2302e4a8b3abeed32d4248b7d014ab893038d6ed36dd246b11ef4b5e1f81c5d9a809533473db792d4f2ccf15f6ec4f0e279664", 0x60}], 0x5}}, {{&(0x7f0000002a00)={0xa, 0x4e22, 0x1000, @ipv4={[], [], @rand_addr=0x7ff}, 0x7}, 0x1c, &(0x7f0000003b00)=[{&(0x7f0000002a40)="6704ee0aeaf2377a388bdef9eca12f96ff7b75b0b7d3423f1f21c27e5f65ce0bdc3f343c38395d3b5f372d7c27d8c442decd790ac33397a6eb9d1e4d839b4b7a2ed68cd2500b67101582aa8684befc780d5b2bb3bac61ec460e1b7e7f9936d4bd9b56a91195a7db0a9ce58c24ea629955c5cab7dcf02e1419be4ba8cb3c403b561387ca96325e3dfeb25adbe97e616ab", 0x90}, {&(0x7f0000002b00)="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", 0x1000}], 0x2, &(0x7f0000003b40)=ANY=[@ANYBLOB="380000000000000029000000370000006703000000000000000100c20400000801010300000001060000000000000502008d00000000000014000000000000002900000043000000fcffffff00000000"], 0x50}}, {{0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000003bc0)="16bb72b54fa12aa902137eb443", 0xd}], 0x1}}], 0x9, 0x40000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r3, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r3, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r4, 0x5421, &(0x7f0000000240)=0x7) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={r4, &(0x7f0000000080)="620952ba85a2e30cf76594a07d80ca6f3faf3289c90eb21cdee6c9547be9557f151abf61b6e6dd1e6652fe48bb213a6e645ded7b33fffea52c4f1fcbffa0c57c419690a092757096f1891718033e3bf4e2c6dd11dc38b81c58deed2e96ef", &(0x7f0000003e80)=""/170, 0x4}, 0x20) 01:16:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x218, @loopback}, 0x1c) 01:16:00 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(&(0x7f0000000100)='./file0\x00', 0x0) 01:16:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:16:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x5c5e6210}, 0x1c) 01:16:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x4, 0x84) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r6 = semget$private(0x0, 0x1, 0x0) semop(r6, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r6, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$GETNCNT(r6, 0x0, 0xe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) r8 = getgid() setresgid(0x0, r8, 0x0) r9 = getegid() semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000000340)={{0x3, r7, r8, 0x0, r9, 0x40, 0x100}, 0x3, 0x80, 0x8}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x90c8531819a23262, r5}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r11 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x8000, 0x101000) ioctl$sock_SIOCGSKNS(r11, 0x894c, &(0x7f00000003c0)=0x3) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r10, @ANYBLOB="00000000ffffffff000000810800010063627100180402000404060003000000003bae10ffffff9e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000000)={@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, r10}, 0xc) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:16:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000000000)={r1, 0x15b}) socket(0x9, 0x808, 0x80) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:01 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x6) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ptype\x00') write$P9_RMKDIR(r0, 0x0, 0x248) 01:16:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:16:01 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(&(0x7f0000000100)='./file0\x00', 0x0) 01:16:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) rt_sigpending(&(0x7f0000000000), 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) write$rfkill(r3, &(0x7f00000001c0)={0x6, 0x0, 0x2, 0x1, 0x1}, 0x8) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000180)='memory.events\x00', 0xe) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r4, 0x5421, &(0x7f0000000240)=0x7) r5 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x5, 0x8000) ioctl$VHOST_SET_VRING_ERR(r4, 0x4008af22, &(0x7f00000000c0)={0x3, r5}) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:01 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(&(0x7f0000000100)='./file0\x00', 0x0) 01:16:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x120c449, 0x4) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) write$UHID_CREATE(r2, &(0x7f0000000200)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000140)=""/185, 0xb9, 0xe3, 0x3, 0x4, 0x40, 0xffffffff}, 0x120) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r3, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r3, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:01 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:16:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x3, @loopback}, 0x1c) 01:16:01 executing program 5: mkdir(0x0, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') [ 582.649991][ C1] net_ratelimit: 10 callbacks suppressed [ 582.650003][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 582.757523][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:16:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x801001ef}, 0x1c) 01:16:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x4, 0x84) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r6 = semget$private(0x0, 0x1, 0x0) semop(r6, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r6, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$GETNCNT(r6, 0x0, 0xe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) r8 = getgid() setresgid(0x0, r8, 0x0) r9 = getegid() semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000000340)={{0x3, r7, r8, 0x0, r9, 0x40, 0x100}, 0x3, 0x80, 0x8}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x90c8531819a23262, r5}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r11 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x8000, 0x101000) ioctl$sock_SIOCGSKNS(r11, 0x894c, &(0x7f00000003c0)=0x3) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r10, @ANYBLOB="00000000ffffffff000000810800010063627100180402000404060003000000003bae10ffffff9e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000000)={@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, r10}, 0xc) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:16:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 582.948560][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 583.017000][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:16:02 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/p\xff\x7f\x00\x00\x00\x00\x00\x00\x00\x00\xf7\x00\x00+\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 01:16:02 executing program 5: mkdir(0x0, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:16:02 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:16:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfffffffffffff800, 0x20000) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000080)=""/50) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 583.385129][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:16:02 executing program 5: mkdir(0x0, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') 01:16:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r3 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x40, 0x20) ioctl$SIOCX25SSUBSCRIP(r3, 0x89e1, &(0x7f0000000140)={'\x00', 0x80000000, 0x200}) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:02 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(0x0, &(0x7f0000000140)='./file0/file0\x00') [ 583.527134][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:16:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:16:02 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(0x0, &(0x7f0000000140)='./file0/file0\x00') [ 583.675508][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 583.691890][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 583.750121][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:16:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x807b0000}, 0x1c) [ 583.871341][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:16:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x4, 0x84) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r6 = semget$private(0x0, 0x1, 0x0) semop(r6, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r6, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$GETNCNT(r6, 0x0, 0xe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) r8 = getgid() setresgid(0x0, r8, 0x0) r9 = getegid() semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000000340)={{0x3, r7, r8, 0x0, r9, 0x40, 0x100}, 0x3, 0x80, 0x8}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x90c8531819a23262, r5}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r11 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x8000, 0x101000) ioctl$sock_SIOCGSKNS(r11, 0x894c, &(0x7f00000003c0)=0x3) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r10, @ANYBLOB="00000000ffffffff000000810800010063627100180402000404060003000000003bae10ffffff9e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000000)={@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, r10}, 0xc) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 01:16:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x5, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0x1, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x3, @loopback}, 0x1c) 01:16:03 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, 0x1ff, 0x1, 0x80000000, 0x8000, 0xa0000, 0x2}, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 01:16:03 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(0x0, &(0x7f0000000140)='./file0/file0\x00') 01:16:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$inet_udp_int(r2, 0x11, 0x67, &(0x7f0000000000)=0x10000, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:03 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:16:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f000012afe4)={0xa, 0x4e26, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:03 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(&(0x7f0000000100)='./file0\x00', 0x0) 01:16:03 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(&(0x7f0000000100)='./file0\x00', 0x0) 01:16:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) r3 = socket$netlink(0x10, 0x3, 0x0) pwritev(r3, &(0x7f0000000740)=[{&(0x7f0000000280)}, {0x0}, {0x0}, {&(0x7f0000000540)}, {&(0x7f0000000140)="d82a63a67db0905d22216f988ad69a815ee05bb5fc3b0679b423b1", 0x1b}, {&(0x7f00000006c0)}, {&(0x7f00000001c0)="9429b5b50cb5d7ad4c7bee7c7ce353e6bc63e9863ef212d9", 0x18}], 0x7, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000340)={r4, @in6={{0xa, 0x0, 0x8001, @remote, 0x5}}, 0x5, 0x5, 0xffffffc1, 0x0, 0xffffffff}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180)={r4, 0x7}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r5, 0xc28}, &(0x7f0000000240)=0x8) r6 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r6, 0x1269, 0x0) ioctl$TCXONC(r6, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r6, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x0, 0x9, [0x3, 0x78, 0x1, 0x0, 0x7, 0xff, 0x5c, 0xadb, 0x9]}, &(0x7f0000000080)=0x1a) getsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r7, &(0x7f0000000140)=0x4) 01:16:03 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(&(0x7f0000000100)='./file0\x00', 0x0) 01:16:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x86c21700}, 0x1c) 01:16:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x4, 0x84) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r6 = semget$private(0x0, 0x1, 0x0) semop(r6, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r6, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$GETNCNT(r6, 0x0, 0xe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) r8 = getgid() setresgid(0x0, r8, 0x0) r9 = getegid() semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000000340)={{0x3, r7, r8, 0x0, r9, 0x40, 0x100}, 0x3, 0x80, 0x8}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x90c8531819a23262, r5}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r11 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x8000, 0x101000) ioctl$sock_SIOCGSKNS(r11, 0x894c, &(0x7f00000003c0)=0x3) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r10, @ANYBLOB="00000000ffffffff000000810800010063627100180402000404060003000000003bae10ffffff9e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000000)={@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, r10}, 0xc) 01:16:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x53b0f111a320cf7b) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000080)=0x7, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:04 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000040)={0x6a}) write$P9_RMKDIR(r0, 0x0, 0xdef8be8e6db6dfd2) 01:16:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="1f"]) 01:16:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000080)=0xf85b, 0x4) sendto$inet6(r0, &(0x7f0000000100)="b4", 0x1, 0x20003c7a, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:04 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 01:16:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r3 = accept(r2, &(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000140)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x22, &(0x7f0000000000)=0xfffffffd, 0x2) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x96dcae0a9eac8385, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2801) ioctl$BLKSECDISCARD(r1, 0x127d, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) r5 = dup(r0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x88, 0x64, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffce6) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0xfffffebc, 0x0, 0x0, 0x337) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r6 = open(&(0x7f00000003c0)='./file1\x00', 0x20141042, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket(0x0, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f0000001b40)=@gcm_256={{0x304}, "d6da789a89e400", "103691d5e6671e02531da43829b340af411153d22b6c492a00aeaf55c3e257d1", '\x00', "32b16ee5ffbd60bd"}, 0xffffff47) ftruncate(r6, 0x280080) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff}]}, 0x10) sendfile(r5, r6, 0x0, 0x200800900000003) [ 585.377696][T25133] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:16:04 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xd70, 0x800) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000080)={0x460e, 0x6, 0x8001, {}, 0x1, 0x65e}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) sendto$inet6(r1, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) prctl$PR_GET_TIMERSLACK(0x1e) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000180)={0x6, 0x7, 0x2, 0x85000, r3}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f00000001c0)={{0x1, 0x0, @descriptor="3de7dbc328678c1d"}, 0xcc, [], "dd2d092a66f3d1d84e5e76d7dad4dfad4c2aa8ba72fcef80c72831fd86f38d1b4a14944701accb38dfd29762c3812589e147bccc714d937c210a6666e640bc0fbf66be34b2b8f5882480c58ab16f87c7c9f7bea5faac4250f303e8d00de74537be5dcad867603dd6abf7b68f0a89596b9bb7b39382a647bb71802305beb688b2b185201496b1c35f9bac9695e4d132d1d44ea9d3782662bb655cd845b1f03817b8b7dc646ca0b0f41458838da58aa32a20066c655e9a9a3bc209959fe4381bcb446198f3b48e070aea2dd300"}) 01:16:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000140)=0x4) listen(r1, 0xfffffb93) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f00000001c0)={0x9, 0x2, 0x1}) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000080)=@v2={0x5, 0x3, 0x1f, 0x9, 0x30, "ad0f55e3b04fd1b00ae283b7a4be60342189fe04aa5fd2a77041bb56e5d2755f800d347650b34b7088890936361db0e0"}, 0x3a, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r4, 0xffffffffffffffff) setsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000180)={0x0, 0xfffffffb}, 0x8) 01:16:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x8dffffff}, 0x1c) 01:16:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r4 = accept4$llc(r3, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r5, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) accept(r5, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000340)={'team0\x00', r6}) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000140)={0xa, 0x5, 0x10000002, 0x180}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000080)={{0x2, 0x0, @reserved="bf1948ffc7c905f105e3217bcd91f969c1f04d152c7b1fac6930209ed589097e"}}) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r5 = semget$private(0x0, 0x1, 0x0) semop(r5, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r5, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$GETNCNT(r5, 0x0, 0xe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) r7 = getgid() setresgid(0x0, r7, 0x0) r8 = getegid() semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000340)={{0x3, r6, r7, 0x0, r8, 0x40, 0x100}, 0x3, 0x80, 0x8}) bind$packet(r3, &(0x7f0000000040)={0x11, 0x90c8531819a23262, r4}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r10 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x8000, 0x101000) ioctl$sock_SIOCGSKNS(r10, 0x894c, &(0x7f00000003c0)=0x3) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000810800010063627100180402000404060003000000003bae10ffffff9e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) 01:16:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x50400, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x7) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f00000000c0)={r4, 0x1}) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:05 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400000100002f, {0x0, 0x0, 0x9947}}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) uname(&(0x7f00000000c0)=""/148) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa6\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x4, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x73d8, 0x382000) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000280)=""/128) exit(0x0) write$P9_RMKDIR(r1, 0x0, 0x0) 01:16:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:05 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000480)='./file0\x00', 0x80000040) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x2) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x2d, 0x6, 0x0, {0x6, 0x6, 0x4, 0x0, 'ppp1'}}, 0x2d) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x7) sendto$inet6(r3, &(0x7f0000000100)="b4", 0x1, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 586.195612][T25172] input: syz0 as /devices/virtual/input/input5 01:16:05 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:05 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xfffffffffffffffb, 0x40000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000940)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f00000000c0)=0xf1) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={r1, 0x7e780cd0}, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) syz_open_dev$dspn(&(0x7f0000001900)='/dev/dsp#\x00', 0x214, 0x4b02) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x4080, 0x0) fadvise64(r4, 0x0, 0x2, 0x2) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r5, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) bind$inet6(r5, &(0x7f000012afe4)={0xa, 0x4e22, 0xfffffffc, @ipv4={[], [], @rand_addr=0xdd}, 0x10000000}, 0x1c) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r6, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r6, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r7 = socket$netlink(0x10, 0x3, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)=""/234, 0xea}, {&(0x7f0000000600)=""/153, 0x99}], 0x2) pwritev(r7, &(0x7f0000000740)=[{&(0x7f0000000280)}, {0x0}, {0x0}, {&(0x7f0000000540)}, {&(0x7f0000000140)="d82a63a67db0905d22216f988ad69a815ee05bb5fc3b0679b423b1", 0x1b}, {&(0x7f00000006c0)}, {&(0x7f00000001c0)="9429b5b50cb5d7ad4c7bee7c7ce353e6bc63e9863ef212d9", 0x18}], 0x7, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f0000000340)={r8, @in6={{0xa, 0x0, 0x8001, @remote, 0x5}}, 0x5, 0x5, 0xffffffc1, 0x0, 0xffffffff}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r8, 0x4) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) listen(r2, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="7e8d38015b394a4f885a64e16d6d315f2b571c1970b225584610eac7c5b88a5e47995c835486c6fe723820b0d0425499a29dec2dae0017917012a3c66dd10dfcfb24f24506353531986927cf7db1c897a346a1b9d95736fcc5616f8b7364933a5914599fec64110b811b424b0e674100fc03acd65cc0c9e6a385ac6e69d96ab6e6d8b3d66e8b0e654c8c33987f3868ebdf86a3d48cf31bfc3943eee93872a49eb96e30b5624eb52c2e6420e793d7a1c6f05344db67c4fa12581e7f00"/201, 0xc9, 0x20003cba, &(0x7f000031e000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) timer_create(0x3, &(0x7f0000000200)={0x0, 0x3f, 0x4, @thr={&(0x7f00000007c0)="111828c0fd8a41f19a5ac3d46702a78957b7452483dbdafc145b1794e1b2ef4bb7151a3ec02af9605c4935bcf0a9c38365a244525435565c274e03ea146928b32677324e2d3f5a4455a6f6a7371b15e74673fc37692503326d79cc16beb08e5141648873a11b4cc3edea9ea10074b1f416c01fb05c3d5d569e7209c67aaff2e362bb9024a775ab33", &(0x7f0000000880)="89eeda5413792386dd321eee5014d3f507018dc4a84a5766e1d3139293d624fb486ea114c9a744ad5f9e4f496233bd3283adcb175474b5b17cf9b877e0c952bc2533b32f51b0eeabecea896b615465fb08c593ecb508f215a9738f11d4b664a72cec7c402e5efaec1c453fe5487e89d0ef290363f178f5fcba89942b682bfcc7388fa7809609555adaef"}}, &(0x7f0000000580)=0x0) timer_getoverrun(r9) [ 586.420186][ T2507] blk_update_request: I/O error, dev loop5, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 586.434638][ T2507] blk_update_request: I/O error, dev loop5, sector 256 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 586.448641][T25183] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 01:16:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x900d0000}, 0x1c) [ 586.508888][ T2506] blk_update_request: I/O error, dev loop5, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 586.532142][T25183] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 01:16:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x6500, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0xc01c, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) setxattr$security_smack_entry(&(0x7f0000000080)='./bus/file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r3 = getgid() setresgid(0x0, r3, 0x0) r4 = getgid() setresgid(0x0, r4, 0x0) r5 = getgid() setresgid(0x0, r5, 0x0) getgroups(0x5, &(0x7f0000000140)=[r3, r4, r5, 0xffffffffffffffff, 0xffffffffffffffff]) r8 = getgid() setresgid(0x0, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETGROUP(r1, 0x400454ce, r7) write$cgroup_subtree(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae5289b414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd154fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r9, 0x5421, &(0x7f0000000240)=0x7) mknodat(r9, &(0x7f00000002c0)='./bus\x00', 0x8000, 0x8) fstat(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000200)=[r6, r8, r10]) [ 586.605736][T25183] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 586.650070][T25183] UDF-fs: Scanning with blocksize 512 failed [ 586.673671][ T2507] blk_update_request: I/O error, dev loop5, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 586.686613][ T2507] blk_update_request: I/O error, dev loop5, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 586.700869][T25183] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 586.701629][T25193] overlayfs: unrecognized mount option "`o" or missing value [ 586.711191][ T2507] blk_update_request: I/O error, dev loop5, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 586.731686][T25183] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 586.747983][T25183] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 586.756226][T25183] UDF-fs: Scanning with blocksize 1024 failed [ 586.768925][ T2507] blk_update_request: I/O error, dev loop5, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 586.780485][ T2507] blk_update_request: I/O error, dev loop5, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 586.782977][T25196] overlayfs: unrecognized mount option "`o" or missing value 01:16:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x628502, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0xffffffffffffffff, 0x10, &(0x7f0000000240)={0x40}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x64, r3, 0x12204266965b6f63, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfffffff7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x100}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x0) [ 586.796467][T25183] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 586.818186][ T2507] blk_update_request: I/O error, dev loop5, sector 2048 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 586.836759][T25183] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 01:16:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = semget$private(0x0, 0x1, 0x0) semop(r4, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r4, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$GETNCNT(r4, 0x0, 0xe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) r6 = getgid() setresgid(0x0, r6, 0x0) r7 = getegid() semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000340)={{0x3, r5, r6, 0x0, r7, 0x40, 0x100}, 0x3, 0x80, 0x8}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x90c8531819a23262, r3}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r8 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x8000, 0x101000) ioctl$sock_SIOCGSKNS(r8, 0x894c, &(0x7f00000003c0)=0x3) [ 586.886913][T25183] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 586.916738][T25183] UDF-fs: Scanning with blocksize 2048 failed [ 586.959942][ T2507] blk_update_request: I/O error, dev loop5, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 586.978542][T25183] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 01:16:06 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_init() lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 587.002111][T25183] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 587.020684][T25183] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found 01:16:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x600, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) utimensat(r2, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x100) [ 587.067520][T25183] UDF-fs: Scanning with blocksize 4096 failed [ 587.121107][T25183] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) [ 587.153013][T25198] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 587.176221][T25198] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 587.201323][T25198] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 587.224231][T25198] UDF-fs: Scanning with blocksize 512 failed [ 587.240244][T25198] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 587.257975][T25198] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 587.268068][T25198] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 587.277174][T25175] input: syz0 as /devices/virtual/input/input6 [ 587.296538][T25198] UDF-fs: Scanning with blocksize 1024 failed [ 587.329312][T25198] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 587.348176][T25198] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 587.358350][T25198] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 587.373774][T25198] UDF-fs: Scanning with blocksize 2048 failed [ 587.384804][T25198] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 587.398424][T25198] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 587.411129][T25198] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 587.421680][T25198] UDF-fs: Scanning with blocksize 4096 failed 01:16:06 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/\x06ttr/\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 01:16:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x400002, 0x0) sendto$inet6(r2, &(0x7f00000000c0)="b405ff1d10237012185900000000000040000000f3", 0x56fe326f, 0x20003c7a, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:06 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) [ 587.427950][T25198] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) 01:16:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x9ac42000}, 0x1c) 01:16:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @local, 0x5}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 587.588372][T25226] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 587.622469][T25226] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 587.668672][T25226] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 587.679921][T25226] UDF-fs: Scanning with blocksize 512 failed 01:16:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000002c0)=0x2, 0x4) listen(r0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x101, 0x0) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000240)=@gcm_128={{0x303}, "e51abff91ab5d9e1", "b8a22109cb8fb3fe00073ec9f73e6fdc", "b6109585", "bc3d4df525d22c82"}, 0x28) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000140)={@hci={0x1f, 0x0, 0x228c7471cfd36726}, {&(0x7f0000000080)=""/89, 0x59}, &(0x7f0000000000), 0xc3d617d263a86a0d}, 0xa0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 587.715962][T25226] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 587.740967][T25226] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 587.760706][T25226] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 587.784061][T25226] UDF-fs: Scanning with blocksize 1024 failed [ 587.798553][T25226] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 587.809591][T25226] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 587.827122][T25226] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 587.842630][T25226] UDF-fs: Scanning with blocksize 2048 failed [ 587.849746][T25226] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 01:16:06 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = semget$private(0x0, 0x1, 0x0) semop(r4, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r4, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$GETNCNT(r4, 0x0, 0xe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) r6 = getgid() setresgid(0x0, r6, 0x0) r7 = getegid() semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000340)={{0x3, r5, r6, 0x0, r7, 0x40, 0x100}, 0x3, 0x80, 0x8}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x90c8531819a23262, r3}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x8000, 0x101000) [ 587.862021][T25226] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 587.881197][T25226] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 587.897702][T25226] UDF-fs: Scanning with blocksize 4096 failed [ 587.904489][T25226] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) 01:16:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x4, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000000c0)=0x8) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xa31afcbdd32dfc74) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xffffffffffffff0e, 0x60000) ioctl$TIOCSIG(r3, 0x40045436, 0x14) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="b4", 0x1, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 01:16:07 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x240802, 0x0) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000080)={0x3, 0x6, 0x81, 0xfff, 0x1, 0x4f, 0x0, 0x5, 0x0, 0x92}) [ 588.157037][T25257] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 588.202651][T25257] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 588.222541][ C0] net_ratelimit: 27 callbacks suppressed [ 588.222552][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 588.266553][T25257] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 588.283425][T25257] UDF-fs: Scanning with blocksize 512 failed 01:16:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1, 0x1, 0x0, 0x0, 0x81, 0x8001}, &(0x7f0000000080)=0x20) [ 588.310484][T25257] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 588.370419][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 588.399559][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 588.403072][T25257] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 01:16:07 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = syz_open_procfs(r1, &(0x7f00000014c0)='stat\x00') getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000001500)=0xdd8, &(0x7f0000001540)=0x4) [ 588.433381][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:16:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 588.500374][T25257] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found 01:16:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xb8ff0000}, 0x1c) [ 588.556225][T25257] UDF-fs: Scanning with blocksize 1024 failed [ 588.568792][T25257] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 588.620704][T25257] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 588.632697][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 588.650269][T25257] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found 01:16:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) pwritev(r3, &(0x7f0000000740)=[{&(0x7f0000000280)}, {0x0}, {0x0}, {&(0x7f0000000540)}, {&(0x7f0000000140)="d82a63a67db0905d22216f988ad69a815ee05bb5fc3b0679b423b1", 0x1b}, {&(0x7f00000006c0)}, {&(0x7f00000001c0)="9429b5b50cb5d7ad4c7bee7c7ce353e6bc63e9863ef212d9", 0x18}], 0x7, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) fdatasync(r1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000340)={r4, @in6={{0xa, 0x0, 0x8001, @remote, 0x5}}, 0x5, 0x5, 0xffffffc1, 0x0, 0xffffffff}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000140)={r4, 0x6}, &(0x7f0000000180)=0x8) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) r5 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x80080) ioctl$VHOST_VSOCK_SET_GUEST_CID(r5, 0x4008af60, &(0x7f0000000080)) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 588.667575][T25257] UDF-fs: Scanning with blocksize 2048 failed [ 588.685093][T25257] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 588.707576][T25257] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 588.746115][T25257] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 588.758711][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 588.769081][T25257] UDF-fs: Scanning with blocksize 4096 failed 01:16:07 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:07 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) [ 588.794011][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 588.805590][T25257] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) 01:16:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000000)='veth1_to_bridge\x00') setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = semget$private(0x0, 0x1, 0x0) semop(r4, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r4, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$GETNCNT(r4, 0x0, 0xe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) r6 = getgid() setresgid(0x0, r6, 0x0) r7 = getegid() semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000340)={{0x3, r5, r6, 0x0, r7, 0x40, 0x100}, 0x3, 0x80, 0x8}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x90c8531819a23262, r3}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) 01:16:08 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 588.965387][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 589.002595][T25292] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 01:16:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140)="2bd1a7da217252a1b3f5283cb47cb828", 0x10, 0x20000010, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x1) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x2001, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) [ 589.043661][T25292] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 01:16:08 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 589.115778][T25292] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 589.166647][T25292] UDF-fs: Scanning with blocksize 512 failed [ 589.187677][T25292] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 01:16:08 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 589.208562][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 589.210967][T25292] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 589.245828][T25292] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 589.254218][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 589.256230][T25312] fuse: Bad value for 'fd' [ 589.301246][T25292] UDF-fs: Scanning with blocksize 1024 failed [ 589.315838][T25292] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 589.332207][T25292] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 589.342160][T25292] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found 01:16:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/p\x00\x00\x00\x00\x00\x00\x00\x00ad-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 01:16:08 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 589.350102][T25292] UDF-fs: Scanning with blocksize 2048 failed [ 589.357412][T25292] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 589.384408][T25292] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 589.409226][T25292] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 589.425493][T25292] UDF-fs: Scanning with blocksize 4096 failed [ 589.425775][T25319] fuse: Bad value for 'fd' [ 589.435416][T25292] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) 01:16:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xc07d0000}, 0x1c) 01:16:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0x1, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x4, @remote}, 0x5) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000000)) 01:16:08 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 589.604173][T25331] fuse: Bad value for 'fd' 01:16:08 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x7) r4 = dup3(r2, r3, 0x80000) getsockopt$bt_sco_SCO_OPTIONS(r4, 0x11, 0x1, &(0x7f0000000b80)=""/77, &(0x7f0000000c00)=0x4d) [ 589.901459][T25339] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 589.924147][T25339] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 589.934538][T25339] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 589.942770][T25339] UDF-fs: Scanning with blocksize 512 failed 01:16:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = semget$private(0x0, 0x1, 0x0) semop(r4, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r4, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$GETNCNT(r4, 0x0, 0xe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) r6 = getgid() setresgid(0x0, r6, 0x0) r7 = getegid() semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000340)={{0x3, r5, r6, 0x0, r7, 0x40, 0x100}, 0x3, 0x80, 0x8}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x90c8531819a23262, r3}, 0x14) 01:16:09 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000000000)=0x1, 0xfffffffffffffe32) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_flowlabel\x00') ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000000c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x7) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000240)={0x4, 0x0, 0xc0ec, 0x5, 0x4, 0x2}) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r4 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200) ioctl$TCXONC(r4, 0x540a, 0xcb) listen(r1, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@v2={0x5, 0x0, 0x10, 0x1000, 0x89, "df98c0bde5c5bcd0a716da67fabb4346224ee19a222a73c6965c390ed66ffe98ae0efcb72a667a73fc32cbce4838414de3369f63ed9425c89cae35fd81df484b5bee70486dcb2648b974a43c243cafdf032728288dbccb7aae407cd6a42fb81fd08a6b00a82424013845ff6d85ef03b9da7ff9c569b4d7d576b4b34b5ef2f3f8827f9a27b634f2100a"}, 0x93, 0x4) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 589.949866][T25339] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 589.963881][T25339] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 590.012459][T25339] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 590.050313][T25339] UDF-fs: Scanning with blocksize 1024 failed 01:16:09 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 590.057478][T25339] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 590.080487][T25339] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 590.090789][T25339] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 590.106963][T25339] UDF-fs: Scanning with blocksize 2048 failed 01:16:09 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 590.119253][T25339] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 590.136484][T25339] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 590.149502][T25339] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 590.167432][T25339] UDF-fs: Scanning with blocksize 4096 failed [ 590.174159][T25339] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) 01:16:09 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/p\x01\x04\x05\x00\x00\x00\x1fa\xe3\xb8.\xc5,c\x00\xff\xff\xff\x7f\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0xfffffffffffffd7d) 01:16:09 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x76656f) [ 590.338813][T25364] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 590.358263][T25364] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 590.368100][T25364] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 590.376053][T25364] UDF-fs: Scanning with blocksize 512 failed [ 590.383003][T25364] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 590.393480][T25364] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 590.403125][T25364] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 590.410759][T25364] UDF-fs: Scanning with blocksize 1024 failed [ 590.417681][T25364] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 590.429300][T25364] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 01:16:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xc2ffffff}, 0x1c) 01:16:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet6(0xa, 0x3, 0x6) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_ENCAP_DPORT={0x8, 0xf}], @gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r6}]]}}}]}, 0x44}}, 0x0) sendmsg$nl_route(r3, 0x0, 0x20004013) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:09 executing program 0: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 590.438984][T25364] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 590.470801][T25364] UDF-fs: Scanning with blocksize 2048 failed [ 590.478085][T25375] netlink: 'syz-executor.3': attribute type 15 has an invalid length. 01:16:09 executing program 0: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 590.501337][T25364] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 590.521679][T25364] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 590.527221][T25375] netlink: 'syz-executor.3': attribute type 15 has an invalid length. [ 590.544048][T25364] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found 01:16:09 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x76656f) [ 590.551928][T25364] UDF-fs: Scanning with blocksize 4096 failed [ 590.558074][T25364] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) [ 590.663028][T25384] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 590.672991][T25384] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 590.682915][T25384] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 590.690674][T25384] UDF-fs: Scanning with blocksize 512 failed [ 590.697559][T25384] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 590.708119][T25384] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 590.717981][T25384] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 590.725682][T25384] UDF-fs: Scanning with blocksize 1024 failed [ 590.732559][T25384] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 590.742372][T25384] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 590.752150][T25384] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 590.760768][T25384] UDF-fs: Scanning with blocksize 2048 failed [ 590.768503][T25384] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 590.779797][T25384] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 590.802095][T25384] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 590.809849][T25384] UDF-fs: Scanning with blocksize 4096 failed [ 590.816354][T25384] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) 01:16:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r3 = semget$private(0x0, 0x1, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r3, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$GETNCNT(r3, 0x0, 0xe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) r5 = getgid() setresgid(0x0, r5, 0x0) r6 = getegid() semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000340)={{0x3, r4, r5, 0x0, r6, 0x40, 0x100}, 0x3, 0x80, 0x8}) 01:16:10 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:10 executing program 0: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x200600) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x100) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000ffb000/0x3000)=nil) listen(r2, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 591.010259][T25392] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 591.051545][T25392] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 591.074527][T25392] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 591.082643][T25392] UDF-fs: Scanning with blocksize 512 failed [ 591.090263][T25392] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 01:16:10 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 591.103540][T25392] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 591.116459][T25392] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found 01:16:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x3, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x12) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/lev;dlm-monit\xd2\xdf\x00', 0x4c09c0, 0x0) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0xa3, 0x2) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) ioprio_set$uid(0x3, r4, 0x5) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r5, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0xa000, 0x7, 0x9, 0x8}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x20400, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r6, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r6, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r7 = dup(r6) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x1000) listen(r1, 0x0) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r8, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r8, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000003c0)) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r9, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r9, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r10 = dup(r9) bind$vsock_stream(r10, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @host}, 0x10) sendto$inet6(r0, &(0x7f0000000180)="b43680d376d9d6bbe8868b6e455c4c255c6755", 0x1, 0x20003c7a, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}, 0x401}, 0xfffffffffffffd1c) [ 591.149424][T25392] UDF-fs: Scanning with blocksize 1024 failed [ 591.174773][T25392] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 591.240543][T25411] fuse: Bad value for 'fd' 01:16:10 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 591.278761][T25392] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 591.311190][T25392] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found 01:16:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xc4ffffff}, 0x1c) 01:16:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4010641a, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[0x9, 0x3, 0x5, 0x8, 0x101]}) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:10 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x545c1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000100)={r4, 0x5}) r5 = socket$netlink(0x10, 0x3, 0x0) pwritev(r5, &(0x7f0000000740)=[{&(0x7f0000000280)}, {0x0}, {0x0}, {&(0x7f0000000540)}, {&(0x7f0000000140)="d82a63a67db0905d22216f988ad69a815ee05bb5fc3b0679b423b1", 0x1b}, {&(0x7f00000006c0)}, {&(0x7f00000001c0)="9429b5b50cb5d7ad4c7bee7c7ce353e6bc63e9863ef212d9", 0x18}], 0x7, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000340)={r6, @in6={{0xa, 0x0, 0x8001, @remote, 0x5}}, 0x5, 0x5, 0xffffffc1, 0x0, 0xffffffff}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={r6, 0x8}, 0x8) write$P9_RMKDIR(r0, 0x0, 0x0) [ 591.323583][T25392] UDF-fs: Scanning with blocksize 2048 failed [ 591.334234][T25392] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 591.353461][T25392] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 591.364136][T25414] fuse: Bad value for 'fd' 01:16:10 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:10 executing program 3: setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000000), 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 591.409866][T25392] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 591.421889][T25392] UDF-fs: Scanning with blocksize 4096 failed [ 591.433908][T25392] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) [ 591.499615][T25425] fuse: Bad value for 'fd' 01:16:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r3 = semget$private(0x0, 0x1, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r3, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$GETNCNT(r3, 0x0, 0xe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) r5 = getgid() setresgid(0x0, r5, 0x0) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000340)={{0x3, r4, r5, 0x0, 0x0, 0x40, 0x100}, 0x3, 0x80, 0x8}) 01:16:10 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:10 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x7a2, 0x1, &(0x7f0000001140)=[{&(0x7f00000000c0)="a8abad840d866b976183c3744061189cf46795a128323970e86ffb90fc", 0x1d, 0x6}], 0x800, &(0x7f0000001180)={[{@fmask={'fmask', 0x3d, 0xfff}}, {@errors_remount='errors=remount-ro'}, {@nls={'nls', 0x3d, 'maccenteuro'}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000001200)='/dev/vcs#\x00', 0xca2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000001240)={'batadv0\x00', 0x200}) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001480)={r3, 0xc0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=0x10001, 0x0, 0x0, 0x0, &(0x7f00000012c0)={0x4, 0x5}, 0x0, 0x0, &(0x7f0000001300)={0x4, 0xc, 0x0, 0x9}, &(0x7f0000001340)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)=0x4}}, 0x10) read(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000) [ 591.950723][T25437] ntfs: (device loop3): parse_options(): Unrecognized mount option fscontext. [ 591.955087][ T2507] print_req_error: 98 callbacks suppressed [ 591.955104][ T2507] blk_update_request: I/O error, dev loop5, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 591.979542][ T2506] blk_update_request: I/O error, dev loop5, sector 256 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 591.991306][T25436] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 591.994297][T25437] ntfs: (device loop3): parse_options(): Unrecognized mount option . 01:16:11 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 592.046683][ T2506] blk_update_request: I/O error, dev loop5, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 592.077730][T25436] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 592.122106][T25436] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 592.150303][T25445] ntfs: (device loop3): parse_options(): Unrecognized mount option fscontext. [ 592.160865][T25445] ntfs: (device loop3): parse_options(): Unrecognized mount option . 01:16:11 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 592.169199][T25436] UDF-fs: Scanning with blocksize 512 failed [ 592.176117][ T2507] blk_update_request: I/O error, dev loop5, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 592.205293][ T2507] blk_update_request: I/O error, dev loop5, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 01:16:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xd80d0000}, 0x1c) [ 592.229227][T25436] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 01:16:11 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r1, 0x5421, &(0x7f0000000240)=0x7) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000080)={0x0, 0x0, 0x83, 0x2, {0x3, 0x21, 0x2, 0x2}}) write(r2, &(0x7f0000000280)="599c12d7b9515b09c5163753db2d168ba37f87c15ca1471ba0e9f199100581c2fb42a557ef47d774395baba6f76b9c6f269ab6403465fcac0188634627ae81e102985bad93276041b4ad1f589e8672bb4c76d4545627df5fa305fca461c404d15423b890fd463148d8e7ca3a4a82c1d900e7cefc9fb2678e57df13a3a1a6d7c1a68c57b8ab0e98fe43db36a79c3ea3b0e2c9dd7949477974d3eb9d0aacd59d0f39332cf0e50397b042ef7b9eec2520efc48c3fbf88a740608dcd91a8ce065bad2fba1cb8825ada0903c2fcb49ccade3e390da4c04f43ab9748fbeaae2df5f2", 0xdf) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x1) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$VIDIOC_ENUM_FMT(r3, 0xc0405602, &(0x7f0000000040)={0x8, 0x1, 0x1, "fcfebc4a933957ebab26877d72927d346b8dc7eeb758c40a4a99a2f5dae129a5", 0xef514b66}) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 01:16:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:11 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 592.288634][ T2507] blk_update_request: I/O error, dev loop5, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 592.309021][T25436] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 592.328875][T25436] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 592.383292][T25436] UDF-fs: Scanning with blocksize 1024 failed [ 592.411383][ T2506] blk_update_request: I/O error, dev loop5, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 01:16:11 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 592.437152][ T2506] blk_update_request: I/O error, dev loop5, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 592.450994][T25436] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 592.487082][ T2507] blk_update_request: I/O error, dev loop5, sector 2048 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 592.500939][T25436] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 01:16:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r3, 0xffffffffffffffff) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000140)=0x4) listen(r3, 0x4) sendto$inet6(r0, &(0x7f0000000100)="b4", 0x1, 0x20041c62, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0xfffffffffffffe8d) [ 592.544341][T25436] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 592.568103][T25436] UDF-fs: Scanning with blocksize 2048 failed [ 592.620618][ T2506] blk_update_request: I/O error, dev loop5, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 592.646946][T25436] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 592.688028][T25436] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 592.706257][T25436] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 592.715243][T25436] UDF-fs: Scanning with blocksize 4096 failed [ 592.727482][T25436] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) 01:16:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r3 = semget$private(0x0, 0x1, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r3, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$GETNCNT(r3, 0x0, 0xe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) r5 = getgid() semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000340)={{0x3, r4, r5, 0x0, 0x0, 0x40, 0x100}, 0x3, 0x80, 0x8}) 01:16:11 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:11 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0xffffff85) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7ff, 0x1) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000080)={0x0, @initdev, @broadcast}, &(0x7f00000000c0)=0xc) 01:16:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = msgget(0x0, 0x81) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000300)=""/95) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000140)=""/246) 01:16:12 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xdc7f0000}, 0x1c) 01:16:12 executing program 3: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={0x200}, &(0x7f0000000080), &(0x7f0000000180)={r0, r1+10000000}, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r3, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:12 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:12 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x108602, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1, 0x280) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r4, 0x5421, &(0x7f0000000240)=0x7) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r5, 0x5421, &(0x7f0000000240)=0x7) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001300)='/dev/dlm_plock\x00', 0x10000, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r7, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r7, 0x5421, &(0x7f0000000240)=0x7) r8 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r8, 0x1269, 0x0) ioctl$TCXONC(r8, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r8, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r9, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r9, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r10 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r10, 0x1269, 0x0) ioctl$TCXONC(r10, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r10, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r11, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r11, 0xffffffffffffffff) r12 = syz_open_dev$dmmidi(&(0x7f0000001640)='/dev/dmmidi#\x00', 0x7, 0x80) r13 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r13, 0x1269, 0x0) ioctl$TCXONC(r13, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r13, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) io_submit(r1, 0x7, &(0x7f0000001780)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x200, r2, &(0x7f0000000080)="1ec4eed27f7d2eb183e23bd9da5e776169760c3a62ffaf956c56f9283f5014cdb8cce1d37b7ac8289e5882d31d19d9a4cf6fd2ebfca4c08fe8a41fc1fa0f33ed8873b452e6498c46349906596904974716429ccbca1330d1de8c537d4e45e1b305b60934c67367ba5d7fa0942ff16d978adbb0be278a20909a1deca1fd6313dc735278010f", 0x85, 0x100000001, 0x0, 0x2, r3}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x6, r0, &(0x7f0000000200)="6daae5a500b6a530d78a53052010cfe0e40dd218121e65ceef3a346c2b9a439717d2dd055871cc970baded82da561f964aebc4884827c1325356abb208a7852225e6b42aaba409ba0957a205743acf8d5bbb456c20ed660f95d1bc45477b6635ed1f671f4b93e7bc9bd5a11cb958bee3af9c5a5a3b63c1969865eaca0eed31de807c032c6ec60703b520b134516397332cb052e0e8862a917d46860742de9b94b18a4e88ea965e0b2bbe2850d71489cd13a2fafb0c290e15564f2caf", 0xbc, 0x1c0000000, 0x0, 0x2, r4}, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x8, 0x8, r5, &(0x7f0000000300)="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", 0x1000, 0x6, 0x0, 0x0, r6}, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x6, 0x1f, r7, &(0x7f0000001380)="cbc68e82c4348426c4a06cb0648fb3c718ee6d3cbbf0c1e7b66e561718d19ad28be49ff56b9725e5486e28fe5d706e3ea02dd83df12c5e514c4cace776adfc12564d2fa25553721f1067fcf44c9d007f1b6b30d8ec2fb2bbb5e6d05d9a99f3e5210f19c92a70e7e707ec3f04857a93b798c2e837334eaea8b48bf2f6c9fe330e623e2afe3f56082154da12bac7196e2826d105916412f14450702ce44b552a4d1d3b9786e1cee65b703b933c9d7123bcc85d4cc527754c6084a0c42bcaf368b0d4eeb911599aae8c9ad4fed0d626f545d7a2cd74eaeb0590d3735ef6fd510936963edba78db4", 0xe6, 0x1, 0x0, 0x1, r8}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x200, r9, &(0x7f00000014c0)="05942f8b49ff70b2e146584d2588673296d8386c10e81aaa39313db6d3c364bb2de34e295c4eb8b521c95defdd5b7226096369fc218d669c15debf42f7871e8b2d7059b72dbbbdc5dbbf873895c3ff9465fa1cfa1805bed8323a4ab4c427af5def7d6eb57907d64e74503a677972a020bac90ce331c2606f88679e0345afa524fb2f0d63153c310429bcf95cd96744fc8cef51955ca7d69774c6317d5862bb73ae8ea01894507e3a7dd6ce77fc84013c691a", 0xb2, 0x800, 0x0, 0x2, r10}, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x1, 0x1, r11, &(0x7f00000015c0)="f87d2f1e6a1004227424635c5353fbac4305bf3ad8768d516321ea20aadf2c7d40e6c055055d0b7034a761cbe0f99ee9b2db5e33b333910c5c6acb65cb284f9e424b4f1c62e3f31728dd1f84c5c05ee151956986fa0e", 0x56, 0x9, 0x0, 0x0, r12}, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x4, 0xff, r0, &(0x7f00000016c0)="272e5c212ec19f5f80baa8d58bf6e83e1feacd12d91d2b78e88c8098750f3cc74105b24302f3142c3b06af037092a237c96528b0fe3f40b0b74be27db1a41aa072f542234c459697d6a11f3972", 0x4d, 0x7, 0x0, 0x0, r13}]) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x60) 01:16:12 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:12 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 593.376351][ C1] net_ratelimit: 35 callbacks suppressed [ 593.376362][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 593.403410][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 593.671177][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 593.677032][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 593.682873][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 593.688613][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:16:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r3 = semget$private(0x0, 0x1, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r3, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$GETNCNT(r3, 0x0, 0xe, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000340)={{0x3, r4, 0x0, 0x0, 0x0, 0x40, 0x100}, 0x3, 0x80, 0x8}) 01:16:12 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:12 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:12 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) [ 593.915811][T25527] fuse: Bad value for 'fd' 01:16:13 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 594.047422][T25537] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 594.059878][T25537] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 594.078949][T25539] fuse: Bad value for 'fd' [ 594.080089][T25537] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found 01:16:13 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 594.099143][T25537] UDF-fs: Scanning with blocksize 512 failed [ 594.120757][T25537] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 01:16:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe00d0000}, 0x1c) 01:16:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/autofs\x00', 0x208002, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000001400), &(0x7f0000001440)=0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899077340ad0ac27adc1569504b679211d1b7ab8e7d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160daafee63a83da9a2093370f6014d1843aa4c0491955e774876f4436e21a5d1a870220d08d8d6f462cf7a0f9fe88043020be196a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9e89543b94b2719f1ca"], 0x200600) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x7) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000000)) [ 594.162945][T25537] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 594.193345][T25548] fuse: Bad value for 'fd' [ 594.194952][T25537] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 594.231172][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 594.237017][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 594.242923][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 594.248697][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:16:13 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:13 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='\x1b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x2, 0x0) exit(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x101800, 0x0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000080)) write$P9_RMKDIR(r0, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x8) [ 594.278090][T25537] UDF-fs: Scanning with blocksize 1024 failed [ 594.314255][T25537] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 01:16:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) getsockopt$inet6_tcp_int(r1, 0x6, 0xf, &(0x7f0000000000), &(0x7f0000000080)=0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 594.400740][T25537] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 594.411092][T25558] fuse: Invalid rootmode [ 594.422227][T25537] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 594.444761][T25537] UDF-fs: Scanning with blocksize 2048 failed 01:16:13 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 594.466095][T25537] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 594.526366][T25537] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 594.540227][T25537] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 594.548738][T25537] UDF-fs: Scanning with blocksize 4096 failed [ 594.556712][T25537] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) [ 594.570598][T25566] fuse: Invalid rootmode 01:16:13 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adcff1b30153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf353b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160865dc3c8432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b22ec0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab8ae5932b7a2912458faf1eea3b098c44fbef92032aa89543b94b2719f1cab7e058dcf9b63ba977f9a91a01b5020f4b19a61956259ee53146ad0bac88fc438805fe4095756d6584d5ac64d2dde04582757ee6e9a8ce6d60efa5b8167e33ffcdc07a25618a7768db36e59da955e4492a68b0801cc249d2079f"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x80, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) connect$llc(r3, &(0x7f0000000140)={0x1a, 0x10ca3c730989354c, 0x1, 0x7f, 0x0, 0x81, @dev={[], 0xa}}, 0x10) r4 = accept4$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x81c00) fsetxattr$trusted_overlay_nlink(r3, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-'}, 0x28, 0x2) r5 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000300)={0x0, 0xd, 0xb, "1c78c1716396361743cce88d4385fdb81ad5d274cf46f3bd25719b4415bc5b8b6e0313f850121df465bd47fdd630b823a499aee8ede70b873fef05cb", 0xa, "c4d6e285000e50b0e3d3405f2314bca61d26c01b52f766d7cd1f93cc8cb90d0900f92e73312dbff1f85cb2c1901771fb3cbd1edbb1b903ba5b4f34ad", 0x40}) bind$inet6(r4, &(0x7f000012afe4)={0xa, 0x4e22, 0x1000000, @loopback}, 0x1c) listen(r1, 0x0) r6 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r6, 0x1269, 0x0) r7 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x8000, 0x0) lseek(r7, 0x100000001, 0x4) ioctl$TCXONC(r6, 0x540a, 0x3) ioctl$VIDIOC_ENUM_FREQ_BANDS(r6, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, &(0x7f0000000200)="ae4d0ba5f8713e61711d7ad6ace79b22", 0x10) 01:16:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r3 = semget$private(0x0, 0x1, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r3, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$GETNCNT(r3, 0x0, 0xe, 0x0) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000340)={{0x3, 0x0, 0x0, 0x0, 0x0, 0x40, 0x100}, 0x3, 0x80, 0x8}) 01:16:13 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) [ 594.902475][T25573] fuse: Invalid rootmode [ 594.903438][T25571] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 594.942627][T25571] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 594.967289][T25571] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found 01:16:14 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 595.009784][T25571] UDF-fs: Scanning with blocksize 512 failed [ 595.028899][T25571] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 01:16:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getgid() setresgid(0x0, r1, 0x0) r2 = getgid() setresgid(0x0, r2, 0x0) getgroups(0x4, &(0x7f0000000000)=[r2, 0x0, 0xee01, 0xee01]) r4 = getgid() r5 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$XDP_MMAP_OFFSETS(r5, 0x11b, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x80) setresgid(0x0, r4, 0x0) r6 = getgid() r7 = getgid() setresgid(0x0, r7, 0x0) r8 = getgid() setresgid(0x0, r8, 0x0) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r10) r11 = getgid() setresgid(0x0, r11, 0x0) lchown(&(0x7f0000000380)='./file0\x00', r10, r11) setgroups(0x6, &(0x7f0000000080)=[r1, r3, r4, r6, r7, r8]) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r5, &(0x7f000012afe4)={0xa, 0x4e22, 0x1be03471, @local}, 0x1c) r13 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r13, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r13, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r14 = socket$inet(0x2, 0x3, 0x91) r15 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x202000, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r13, 0x89e0, &(0x7f0000000240)={r14, r15}) syz_open_dev$ndb(&(0x7f0000000340)='/dev/nbd#\x00', 0x0, 0x452842) open_by_handle_at(0xffffffffffffffff, &(0x7f00000002c0)={0x7b, 0x8, "075b8328d6d73a05d384e5ab62f90824a3e8afadb1bcfc7f9362dc02f1445ffa2319b82f00cbfa81485d9bcd00fe018c1915f86343aa641e8a501fc4b1f925ad5eebb0c2c60b6af27e4db459c8e62609ac32467a85c7bc63cba19a8c2476d11e7e39420e3b9e53bde7e0bf7b11071c41198752"}, 0x4000c1) listen(r12, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 595.080097][T25571] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 01:16:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe02e0000}, 0x1c) 01:16:14 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 595.146563][T25571] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 595.170825][T25571] UDF-fs: Scanning with blocksize 1024 failed [ 595.179425][T25571] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 01:16:14 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_getscheduler(r2) write$P9_RMKDIR(r0, 0x0, 0x0) [ 595.236797][T25571] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 01:16:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) recvmsg$can_bcm(r2, &(0x7f00000003c0)={&(0x7f0000000080)=@ipx, 0x80, &(0x7f0000000280)=[{&(0x7f0000000000)=""/49, 0x31}, {&(0x7f0000000140)=""/197, 0xc5}, {&(0x7f0000000240)=""/5, 0x5}], 0x3, &(0x7f00000002c0)=""/236, 0xec}, 0x20000000) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 595.321621][T25571] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 595.353465][T25571] UDF-fs: Scanning with blocksize 2048 failed 01:16:14 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) [ 595.370421][T25571] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 595.407923][T25571] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 595.418151][T25571] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found 01:16:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e26, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000080)=""/27) [ 595.448217][T25571] UDF-fs: Scanning with blocksize 4096 failed [ 595.467682][T25571] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) 01:16:14 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:14 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x2000, 0x0) fcntl$getown(r0, 0x9) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r3 = semget$private(0x0, 0x1, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r3, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000340)={{0x3, 0x0, 0x0, 0x0, 0x0, 0x40, 0x100}, 0x3, 0x80, 0x8}) 01:16:14 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:14 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4b0541, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r4, 0x5421, &(0x7f0000000240)=0x7) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r4, 0x800442d2, &(0x7f0000000200)={0x31b, &(0x7f0000000180)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @dev}]}) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r3, 0xc01064b5, &(0x7f0000000140)={&(0x7f00000000c0)=[0x0, 0x0], 0x2}) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x1d8, 0x5, 0x0, {0x0, 0x400000000000001, 0x0, 0x1}}, 0x30) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 595.914669][T25624] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 595.937573][T25624] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 595.963613][T25624] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 595.981241][T25624] UDF-fs: Scanning with blocksize 512 failed [ 595.998493][T25624] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 596.038380][T25624] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 596.066437][T25624] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found 01:16:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xe8030000}, 0x1c) 01:16:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x1, 0xfffffffffffffdae) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 596.097125][T25624] UDF-fs: Scanning with blocksize 1024 failed [ 596.118030][T25624] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 01:16:15 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000000)=""/180) exit(0x0) r0 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1, r0) r1 = request_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0xfffffffffffffffc) keyctl$reject(0x13, r0, 0x401, 0x800, r1) fanotify_init(0x0, 0x282400) 01:16:15 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100)={'U+', 0x7}, 0x28, 0x1) 01:16:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fab0001007b485249652fa2bf35fd8f663b00abada61a7d5959bc818c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb3f24c4a62791df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b9"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 596.183666][T25624] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 596.219167][T25624] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 596.235267][T25624] UDF-fs: Scanning with blocksize 2048 failed 01:16:15 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x1) [ 596.282683][T25624] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 596.333792][T25624] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 01:16:15 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_group_source_req(r0, 0x0, 0x2a, &(0x7f0000000140)={0x20, {{0x2, 0x4e22, @remote}}, {{0x2, 0x4e22, @multicast1}}}, 0x108) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000000100)="b4", 0x1, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x2}, 0x1c) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x100) ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f0000000080)) [ 596.374753][T25624] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 596.388996][T25624] UDF-fs: Scanning with blocksize 4096 failed [ 596.408141][T25624] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) 01:16:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f00000000c0)='$\x00', 0x2, 0x1) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r2, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000140)=[@timestamp, @window={0x3, 0x3f, 0x1}, @mss={0x2, 0x7}], 0x3) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r3 = semget$private(0x0, 0x1, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000340)={{0x3, 0x0, 0x0, 0x0, 0x0, 0x40, 0x100}, 0x3, 0x80, 0x8}) 01:16:15 executing program 5: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vxcan1\x00', 0x0}) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000700)={0x1d, r2, 0x2, {0x3, 0x1, 0x2}, 0xfe}, 0x18) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$inet6_tcp_buf(r3, 0x6, 0x1f, &(0x7f0000000000)="57c421ff8423f0fcc36b452dea1294adc86fc5a2d43af34b51e327dd969dc0849341e403f7b9", 0x26) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f0000000080)={0x0, r0}) listen(0xffffffffffffffff, 0x8) sendto$inet6(r0, &(0x7f0000000100)="b4", 0x1, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e24, 0x0, @loopback, 0x1000}, 0x1c) getpeername(r1, &(0x7f0000000140)=@sco, &(0x7f00000000c0)=0x80) 01:16:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x100) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="2c000000040000000000000000000000000000c9915866bd00000000000000000000000000040000000000000000000000bb10deab234020526406692761f62aba99b50fc9c6cede434445b4a8a0998e2bfa59efad61cd114c6c106621ab1890bd43afa95a283a8fedc55888116f92800482ce8c91f085252123fa366790536375b26ffbfaeb6503d744476c823d137db4895b7ec76642b2517c42bc52092320995f5156878bcde99f29386c64db20b9668db278aea9e073bf570b7f3bee3ca02517"], 0x2c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xef011080}, 0x1c) 01:16:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000080)={0x6, 0x6, 0x1, 0xfffe}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r4 = accept4$vsock_stream(r3, &(0x7f00000000c0), 0x10, 0x800) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000140)=0x1) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r5, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r7) r8 = getpgrp(0x0) setpriority(0x0, r8, 0xffff) sendmsg$nl_generic(r5, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)={0x204, 0x22, 0x102, 0x70bd2a, 0x25dfdbfb, {0xd}, [@nested={0x20, 0x3f, [@typed={0x8, 0x89, @uid=r7}, @typed={0xc, 0x4, @u64=0x6d4}, @typed={0x8, 0x4a, @ipv4=@empty}]}, @nested={0x1d0, 0x7c, [@typed={0x20, 0x78, @binary="ff7b2e8c1ebf7c944276ac2439635b1d88465e69faf817c4344e204b"}, @typed={0x8, 0x27, @pid=r8}, @typed={0xc, 0x16, @u64=0x64}, @generic="66daabde40c36083ecef362230b40acc22c3a3518a14cee2450e823822850395a333171500366d9032618b5afd4b5b79d5bcd307cae273d3d1370b35374347ae9d7c85585fda56d05b4a79c0296b7f3cf8a97a5e44c36ccd8ee455a2ca11ac73119ba40113c2c81f8d75bc12d19db34a85f7bd4bdafb2166dff4c8aa4eccd45375e3f473f2ebdfff5f58e6e4d3e0673755925384cf0fc6520f7a52724a9bfa2e5893c305909b37d610a0cb5cbc57913099", @generic="155cfcca31843d7314c3a01c9584db430386efbcdcb5ca64da07c16190d828f3a654598a34484c33f49975da1b603f49061a3551b1920d412040e17377eeea999bf1f3d0154f57aac2378204ccff7651adedc39b9bc559261e0c6aa61041eb8fe2cbde2cd169556c7efdea6ae67304261822185d2d6085cc5ddb8ded53c5fbc2294cd9344bc9ca11ef3b00e7c50d291b6e9ef84899de8c1528c64c6ac773e856df127c290a3ce50d4c285ab28babbc182c5853e8ebef1e9d1ab3a8fdb73fff7e5cc782d7a21ab84d6c3b6e3121f4035ed100b69e92ac426e3a21d0ecaf4d0ce90f96d6ed7c"]}, @generic]}, 0x204}, 0x1, 0x0, 0x0, 0x2084}, 0x4000) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5792da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r9, 0x5421, &(0x7f0000000240)=0x7) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x1, 0x2002) ioctl$IOC_PR_PREEMPT_ABORT(r9, 0x401870cc, &(0x7f0000000180)={0x4, 0x40, 0x2, 0x7}) 01:16:16 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 01:16:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x7) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000000)={0x2}) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000080)=0x1) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:16 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) r2 = getgid() setresgid(0x0, r2, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) r8 = getgid() setresgid(0x0, r8, 0x0) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) r10 = getgid() setresgid(0x0, r10, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r11, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r11, 0x5421, &(0x7f0000000240)=0x7) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) getresuid(&(0x7f00000003c0)=0x0, &(0x7f0000000400), &(0x7f0000000440)) r14 = getgid() r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r16) r17 = getgid() setresgid(0x0, r17, 0x0) r18 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r19) r20 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r21) r22 = getgid() setresgid(0x0, r22, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000d80)=ANY=[@ANYBLOB="300700000000000007000000000000000100000000000000030000000000000005000000000000000600000000000000910800000400000002000000000000000100000000000000000001000000000000000000000000001b00000000000000030000000000000012bd000008000000c00000000000000009000000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="ff7f0000ef00000000000000030000000000000000000000010000001c0000000000085d2f70726f632f7468726561642d73656c662f617474722f65786563000000000000000000000000000200000000000000090000000000000012277619000000000600000009000000040000000000000045000000000000000500000000000000ff7f0000000000000000000000000000ff7f000000000000a00800006f000000ffffffff0d73000001000080", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="e10d0000ff01000000000000000000000000000001800000000000000600000003000000402965746830000000000000000000000000000000000000030000000000000000080000000000007fc8000009000000040000000000000000000000000000000010000000000000000000000000000002000000000000002000000000000000b90000000600000005000000ffffffff11040000", @ANYRES32=0x0, @ANYRES32=r6, @ANYBLOB="ffffffff0600000000000000030000000000000001000000000000001c000000080000002f70726f632f7468726561642d73656c662f617474722f6578656300000000000600000000000000020000000000000007000000000000007f0000000000000001040000030000000300000000000000f10000000000000001f0ffffffffffff0004000000000000030000000000000003000000000000000000000003000000060000000600000081000000", @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="070000000400000000000000010000000000000001000000000000001c000000010000002f70726f632f7468726561642d73656c662f617474722f65786584fa0000000002000000000000000200000000000000350b000000000000008000000000000008000000050000000600000000000000000000000000000001000000000000004448b932000000000300000000000000a4030000000000000600000008000000b3f3ffff09000000feffffff", @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="00000000f624000000000000030000000000000007000000000000001c000000010000002f70726f632f7468726561642d73656c662f617474722f6578656300000000000100000000000000000000000000000007000000000000000000000000000000ff030000eb00000006000000000000008000000000000000ff00000000000000ff000000000000000100008000000000000000000000000004000000030000000000008000000000ff7f0000", @ANYRES32=0xee00, @ANYRES32=r12, @ANYBLOB="090000000900000000000000010000000000000088680000000000001c000000010000002f70726f632f7468726561642d73656c662f617474722f657865630000000000030000000000000002000000000000000000000000000000ffffffff000000000600000004000000040000000000000000000000000000000800000000000000040000000000000008000000000000000101000000000000000000800700000000000000f8ffffff09000000", @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="09000000f800000000000000060000000000000001800000000000001c000000ffffffff2f70726f632f7468726561642d73656c662f617474722f657865630000000000030000000000000003000000000000000900000000000000ff0700000000000001000000020000000300000000000000000001000000000002000000000000008100000000000000ff0f000000000000030000000000000004000000a32c00000180000001000000ff7f0000", @ANYRES32=r16, @ANYRES32=r17, @ANYBLOB="030000000900000000000000020000000000000007000000000000001c000000030000002f70726f632f7468726561642d73656c662f617474722f657865630000000000010000000000000003000000000000000000000000000000f30000000000000004000000090000000300000000000000008000000000000040000000000000005a59796a00000000060000000000000002000000000000000100000005000000d3ccbe5a01000000cc0b0000", @ANYRES32=r19, @ANYRES32=0xee00, @ANYBLOB="39000000030000000000000003000000000000009c0000000000000021000000404000002fd02c656d31766d6e657430232573656c696e757847504c2e7d6e6f6465766c6f00000000000000040000000000000002000000000000000400000000000000050000000000d181392eb916ff249deb0000000001000800000005000000000000000800000000000000030000000000000006000000000000000900000000000000040000000000000000010000090000000600", @ANYRES32=r21, @ANYRES32=r22, @ANYBLOB="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"], 0x730) 01:16:16 executing program 5: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) r4 = dup2(r2, r3) ioctl$KVM_SET_GSI_ROUTING(r4, 0x4008ae6a, &(0x7f0000000140)={0x4, 0x0, [{0x7, 0x0, 0x0, 0x0, @adapter={0x5, 0x80000001, 0x7ff800000000, 0x3, 0x6875}}, {0x139, 0x4, 0x0, 0x0, @sint={0x401, 0x8}}, {0x1, 0x4, 0x0, 0x0, @sint={0x5, 0x4a}}, {0x14, 0x3, 0x0, 0x0, @irqchip={0x0, 0x8}}]}) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:16 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 01:16:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r3 = semget$private(0x0, 0x1, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000340)={{0x3, 0x0, 0x0, 0x0, 0x0, 0x40, 0x100}, 0x3, 0x80, 0x8}) 01:16:16 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x0, 0x98000) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000200)=0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r4 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r4, 0x1269, 0x0) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r4, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) r5 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r5, 0x1269, 0x0) ioctl$TCXONC(r5, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r5, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f0000000240), 0x4) r6 = socket$netlink(0x10, 0x3, 0x0) pwritev(r6, &(0x7f0000000740)=[{&(0x7f0000000280)}, {0x0}, {0x0}, {&(0x7f0000000540)}, {&(0x7f0000000140)="d82a63a67db0905d22216f988ad69a815ee05bb5fc3b0679b423b1", 0x1b}, {&(0x7f00000006c0)}, {&(0x7f00000001c0)="9429b5b50cb5d7ad4c7bee7c7ce353e6bc63e9863ef212d9", 0x18}], 0x7, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000000340)={r7, @in6={{0xa, 0x0, 0x8001, @remote, 0x5}}, 0x5, 0x5, 0xffffffc1, 0x0, 0xffffffff}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r7, 0x1000}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000000c0)={r8, 0x9a7b}, 0x8) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:16 executing program 5: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:17 executing program 5: creat(0x0, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xf4010000}, 0x1c) 01:16:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000000)='\b', 0xffffffffffffff01, 0x4058, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @local, 0xfffffffd}, 0xcfb11b7bd2c91e30) 01:16:17 executing program 5: creat(0x0, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:17 executing program 0: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r4, 0x5421, &(0x7f0000000240)=0x7) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r3, r5, 0x1000) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r6, 0x5421, &(0x7f0000000240)=0x7) ioctl$MON_IOCQ_URB_LEN(r6, 0x9201) 01:16:17 executing program 5: creat(0x0, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:17 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000200)={r0, r0, 0x4, 0xa, &(0x7f0000000080)="51ecef113022bf55aa8d", 0x8, 0x8, 0x6f88, 0x2, 0x1, 0x3, 0x7ff, 'syz0\x00'}) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) recvfrom$llc(r0, &(0x7f0000000140)=""/178, 0xb2, 0x100, &(0x7f0000000000)={0x1a, 0x310, 0x80, 0x3f, 0x3f, 0x1, @local}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000000100)="a7", 0x1, 0x20008080, &(0x7f000031e000)={0xa, 0x4e22, 0x2, @loopback}, 0xfffffde5) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) write$FUSE_POLL(r3, &(0x7f00000000c0)={0x18, 0x0, 0x2, {0x6}}, 0x18) [ 598.391162][ C0] net_ratelimit: 50 callbacks suppressed [ 598.391170][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 598.402662][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 598.408511][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 598.414300][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 598.420135][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 598.425927][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 598.431769][ C0] protocol 88fb is buggy, dev hsr_slave_0 01:16:17 executing program 4: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) pipe2$9p(&(0x7f0000000000), 0x80000) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0xd2e37a6c30d187f0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x100, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000200)={{0x13}, 0x1, 0x30, 0x5, {0x1, 0x2}, 0x8, 0x8}) setsockopt$packet_int(r0, 0x107, 0x99479538bb7c699, &(0x7f0000000140)=0x100, 0x4) [ 598.437537][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:16:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r3 = semget$private(0x0, 0x1, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0xffffffffffffff89}], 0x1) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000340)={{0x3, 0x0, 0x0, 0x0, 0x0, 0x40, 0x100}, 0x3, 0x80, 0x8}) 01:16:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x2, 0x0) read(r0, 0x0, 0x38a) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000140)) 01:16:17 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0x80000) recvfrom$x25(r2, &(0x7f0000000140)=""/215, 0xd7, 0x40, &(0x7f0000000080)={0x9, @remote={[], 0x1}}, 0x12) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x6c8, 0x4b8, 0x298, 0x138, 0x298, 0x0, 0x5f8, 0x5f8, 0x5f8, 0x5f8, 0x5f8, 0x6, &(0x7f0000000240), {[{{@ipv6={@mcast2, @mcast1, [0xff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0xff000000, 0xffffff00, 0x1fe7fffff], 'dummy0\x00', 'nr0\x00', {0x1fe}, {}, 0x6, 0x80, 0x2, 0x46}, 0x0, 0x110, 0x138, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x3d4e95af, 0x0, 0x1, [0x1, 0x20, 0x74, 0x1, 0x7f, 0x8000, 0x8000, 0x9, 0x2, 0x101, 0x0, 0x2, 0x5, 0x3, 0x0, 0x2], 0x4}}]}, @HL={0x28, 'HL\x00', 0x0, {0x0, 0x1f}}}, {{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xe, 0x1c, 0x1f}}, @common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x18, 0x20, 0x1}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@loopback, 0x33, 0x23, 0x27c0}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x27}, @mcast2, [0xffffff00, 0xffffff00, 0xff], [0x907fcd7b2007a06c, 0x7fffff80, 0xffffffff, 0x7fffffff], 'veth0\x00', 'ip_vti0\x00', {}, {0xff}, 0x0, 0xcf, 0x4, 0x20}, 0x0, 0xc8, 0x110}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@ipv4={[], [], @loopback}, @ipv4=@multicast2, 0xc, 0x3c, 0x4}}}, {{@uncond, 0x0, 0xc8, 0x110}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@loopback, 0x36, 0x30, 0xff}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x1e}, @loopback, [0xffffff00, 0x457ef221f0e9d577, 0xff000000], [0xff, 0xff, 0xffffff00, 0x1000000fe], 'nlmon0\x00', 'team0\x00', {0x341cb3dbc55388eb}, {0xff}, 0xca38f71dad75ab3c, 0x7f, 0x2}, 0x0, 0x118, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x3}}, @inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x728) chmod(&(0x7f00000000c0)='./file0\x00', 0x100) [ 598.874730][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 598.882722][ T2506] print_req_error: 38 callbacks suppressed [ 598.882738][ T2506] blk_update_request: I/O error, dev loop5, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 598.903158][ T2506] blk_update_request: I/O error, dev loop5, sector 256 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 598.914599][T25770] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 598.915726][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 598.924750][ T2506] blk_update_request: I/O error, dev loop5, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 598.948498][T25770] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 01:16:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xf5ffffff}, 0x1c) 01:16:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = dup(0xffffffffffffffff) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x198, r3, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc4d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_BEARER={0xf4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xffff, @dev={0xfe, 0x80, [], 0x26}, 0x9}}}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x80000000, @rand_addr="1406dffb6911d8b7921da30a5dc4bd87", 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8345}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x0, @mcast1, 0x8001}}}}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x4100}, 0x40) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 599.000434][T25770] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 599.033638][T25770] UDF-fs: Scanning with blocksize 512 failed [ 599.050551][ T2506] blk_update_request: I/O error, dev loop5, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 599.063303][ T2506] blk_update_request: I/O error, dev loop5, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 599.076618][T25770] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 599.120209][ T2506] blk_update_request: I/O error, dev loop5, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 599.132299][T25770] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 01:16:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8bba31bc1d1316ca, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0x1, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x10}, 0x1c) [ 599.180990][T25770] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 599.199782][T25770] UDF-fs: Scanning with blocksize 1024 failed [ 599.213844][ T2506] blk_update_request: I/O error, dev loop5, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 599.245405][ T2506] blk_update_request: I/O error, dev loop5, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 599.256934][T25770] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 599.291477][ T2507] blk_update_request: I/O error, dev loop5, sector 2048 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 599.303623][T25770] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 599.324818][T25770] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found 01:16:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x5, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e24, 0x5, @empty}, 0x1c) listen(r2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000140)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 01:16:18 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x4e24, 0x4e20, 0x8}}}}}}, 0x0) [ 599.338444][T25770] UDF-fs: Scanning with blocksize 2048 failed [ 599.348230][ T2507] blk_update_request: I/O error, dev loop5, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 599.366773][T25770] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 599.431468][T25770] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 01:16:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000140)="8e73b3bc159051c04a58aa357532c1e34ed5dd24077f8da4aceb6888ac349b54424d31bd1f44ecf911b5edfd21182d734b81ee6bbd6d7afb2f4adabfa90c698847a78dc26e06a4cbc353cead1b926be3ea6c08ea4014840a839418fc2e63f38706f7861d8f0d3a7c72f8cd950ce0ab08b035a8200d28795dc781a2d98f159685fac464d55f272cc88c7cb70e482adbe4897a6284459bfe8b9424047466773d50eecfbd6218700404b6860bc388e66783146d122cb7baf84fe160340c6e9649a9d92e62cf900791cd9e614c30968ed433b6117b21e03b5c2cd6024980d6cece", &(0x7f0000000240)=""/199, 0x4}, 0x20) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x2001, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x100000001, 0x2) ioctl$EVIOCGSND(r4, 0x8040451a, &(0x7f0000000440)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000440)) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r3, 0xffffffffffffffff) getsockopt$inet6_buf(r3, 0x29, 0x2f, &(0x7f0000000340)=""/157, &(0x7f00000000c0)=0x9d) [ 599.489775][T25770] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 599.498729][T25770] UDF-fs: Scanning with blocksize 4096 failed [ 599.507124][T25770] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) 01:16:18 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000002180), 0x3c3) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$update(0x2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x7ff, &(0x7f00000003c0)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000240)=ANY=[], 0x0) r1 = creat(0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0)=@abs={0x1}, 0x6e, 0x0}, 0x0) ioctl$RTC_PLL_GET(r2, 0x801c7011, &(0x7f0000000100)) r3 = creat(&(0x7f0000000540)='./file0\x00', 0x0) write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x66) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000080)=""/83) 01:16:18 executing program 0: r0 = syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x2, 0x0) read(r0, 0x0, 0x38a) 01:16:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r3 = semget$private(0x0, 0x1, 0x0) semop(r3, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000340)={{0x3, 0x0, 0x0, 0x0, 0x0, 0x40, 0x100}, 0x3, 0x80, 0x8}) 01:16:19 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) 01:16:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r3, 0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r4, 0x5421, &(0x7f0000000240)=0x7) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r5, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r5, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r10, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r10, 0xffffffffffffffff) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r12, &(0x7f0000000640)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afa474a1ca29ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304017b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2e74f4725097eeafd714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r12, 0x5421, &(0x7f0000000240)=0x7) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r13, &(0x7f00000003c0)=ANY=[@ANYBLOB="f022e64feae52899414d40ad0ac27adc153123afad018b4729ab8e6d0e62c4f9ac657719658926d7cc95a4490dcd554fabd304007b485249652fa2bf35fd8f663b00abada61a7d5959bc858c0a5e7645c0c814f5799c422da160023cedf5432c673e093370f6034d1843aa4c0491955e774876f4436e210bdf4c24b90dc6d8d6f462cf7a0f9fe88043020be1c3a09ed19e316619fa5e040dfd73a696a902f406b225c0333c2ed714756f12fd854b0dcb91df54268d87b419ae2c0bab1eea3b098c44fbd2b252d9a89543b94b2719f1ca"], 0x200600) ioctl$int_in(r13, 0x5421, &(0x7f0000000240)=0x7) getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000480)=0x89) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getgid() setresgid(0x0, r16, 0x0) r17 = getgid() r18 = getgid() setresgid(0x0, r18, 0x0) r19 = getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010002000000000002000200", @ANYRES32=r2, @ANYBLOB="02000100", @ANYRES32=r6, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=r8, @ANYBLOB="02000000", @ANYRES32=r9, @ANYBLOB="02000100", @ANYRES32=r11, @ANYBLOB="02000400", @ANYRES32=r14, @ANYBLOB="02000400", @ANYRES32=0xee01, @ANYBLOB="02000400", @ANYRES32=r15, @ANYBLOB="040000000000000008000000", @ANYRES32=r16, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r17, @ANYBLOB="1c000105", @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r19, @ANYBLOB="1000f0be000000002000000000000000b7a38bac6da65f54"], 0x8c, 0x2) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r20 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r20, 0x1269, 0x0) ioctl$TCXONC(r20, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r20, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) listen(r20, 0x10001) sendto$inet6(r0, &(0x7f0000000100)="b4", 0x1, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x2, @loopback}, 0xfffffffffffffd42) 01:16:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r1, &(0x7f0000000980)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d282c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fed461069ecca85c7d5c0707e8bf"], 0x34) sendto$inet(r1, 0x0, 0x0, 0x8000, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)={'#! ', './file0', [], 0xa, "39980cfd42119cc4e1040300"/25}, 0x24) 01:16:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xfc000000}, 0x1c) 01:16:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000140)="db65ab98f8dadf0a3133d4132f41c6041b31e1b7f0a8058d75b978496ae84b47ddca924152973137f037b41ff5c4a5ec98d61081b17610ea0c28df3872f786e6a15c9c2a3c8917c7734556017657f88079e3fa9db90f7d043c98b82cd9127e17f9a7b626d7eff60bfdc2535de36ed81f0fcb44caa12ea0b38db096889701b0835c3dbc855fa7db388cc0592ccc9538f944f40aaf17f78d68629b5cb6c4efeda4e08022d011dabfe227e2cf2d13ce31a4e9c65fb537f915d8e1db01e4a897e4688ddcbc45f2c01c160cbf504ba0978a84f9243696f25472741166fa", 0xdb, 0xcebf14008eeb7527, &(0x7f0000000000)={0xa, 0x4e22, 0x82, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x0, 0x6, 0x3ff}) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) flistxattr(r0, &(0x7f0000000240)=""/235, 0xeb) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 600.110791][T25827] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 600.121671][T25827] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 01:16:19 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000800), 0x8) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f00000009c0)='threaded\x00', 0x76656f) syz_genetlink_get_family_id$SEG6(0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write(r4, &(0x7f00000006c0)="7eeb9eb5", 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ptmx\x00', 0x0, 0x0) [ 600.194353][T25827] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 600.222276][T25827] UDF-fs: Scanning with blocksize 512 failed [ 600.253199][T25827] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 600.279159][T25827] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 01:16:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x800, 0x101000) io_uring_register$IORING_UNREGISTER_EVENTFD(r1, 0x5, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) capget(&(0x7f00000001c0)={0x19980330, 0xffffffffffffffff}, &(0x7f0000000200)={0x200, 0x80000000, 0x9, 0x5, 0x8, 0x8}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r5, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r5, 0xffffffffffffffff) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000000180)={0x2c, &(0x7f0000000140)=[r4, r5]}, 0x2) ioctl$BLKPG(r3, 0x1269, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) accept$ax25(r3, &(0x7f0000000080)={{0x3, @rose}, [@bcast, @bcast, @rose, @netrom, @netrom, @netrom, @default, @bcast]}, &(0x7f0000000000)=0x48) listen(r2, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0x1, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @local, 0x4000005}, 0x1c) [ 600.294928][T25847] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 600.305848][T25827] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 600.326797][T25827] UDF-fs: Scanning with blocksize 1024 failed [ 600.337068][T25827] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 600.364580][T25847] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 600.368489][T25827] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 600.400779][T25851] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use) [ 600.402412][T25827] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 600.431157][T25827] UDF-fs: Scanning with blocksize 2048 failed [ 600.433492][T25847] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 600.452160][T25827] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 600.464563][T25827] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 600.466959][T25847] UDF-fs: Scanning with blocksize 512 failed [ 600.485707][T25827] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 600.504264][T25827] UDF-fs: Scanning with blocksize 4096 failed 01:16:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000080)={0x80000001, 0x9, 0x1ff, 0x1bbd, 0x8, "825db7f1471e93f642a6556986e424329eb395", 0x2, 0x8}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r3, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x200600) r5 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r5, 0x1269, 0x0) ioctl$TCXONC(r5, 0x540a, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r5, 0xc0405665, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x20, 0x100000001, 0x0, 0x8}) getsockopt$nfc_llcp(r5, 0x118, 0x0, &(0x7f0000000740)=""/211, 0xd3) ioctl$int_in(r4, 0x5421, &(0x7f0000000240)=0x7) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r6, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r6, 0xffffffffffffffff) open_by_handle_at(r6, &(0x7f0000000180)={0xa6, 0x5, "96d20f7786765a59712f04bf5ffddfee9cf93d7d26f854736a09503b6ca8efcdaa2f0e93b6198720e910fc038462f1b8a3fe3de44f2fd91ce6e19f7eff7935d768f4db415efdf90225d68bc7c35b59277f92ad20855a9446d7e141dcfabb6b3d544707565670b752f4fdc4aa7fd50d4a3ce72cd8d7415b06a5a6826cea1ba524c8410646362d43c56dd334a7af808e652b9c8288f573cd84dca71da51198"}, 0x1800) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f00000000c0)=0x1) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r7 = semget(0x3, 0x1, 0x4) semctl$SETALL(r7, 0x0, 0x11, &(0x7f0000000000)=[0xd292]) [ 600.509585][T25847] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 600.513342][T25827] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1) [ 600.538988][T25847] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 600.590430][T25847] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 600.624477][T25847] UDF-fs: Scanning with blocksize 1024 failed 01:16:19 executing program 5: creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76656f) [ 600.643422][T25847] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 01:16:19 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000280)={0xfffffff7, 0x1, 0x1, 0x8000, 0x7, 0x9, 0x8}) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000000100)="b4", 0x1, 0x20003c7a, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0x3}, 0x1c) 01:16:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_open_dev$char_usb(0xc, 0xb4, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x88000, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x600000, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000240)={[0x0, 0x5000, 0x2, 0x3000], 0x4, 0x10, 0x2ba}) r3 = dup(r1) write$P9_RWRITE(r3, &(0x7f00000000c0)={0xb}, 0xb) [ 600.700944][T25847] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 600.780640][T25847] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 600.810206][T25847] UDF-fs: Scanning with blocksize 2048 failed [ 600.846390][T25865] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 600.847672][T25847] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 600.908596][T25865] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 600.925160][T25847] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 600.933563][T25865] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 600.942813][T25865] UDF-fs: Scanning with blocksize 512 failed [ 600.969556][T25865] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 601.003504][T25847] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 601.023367][T25865] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 601.046899][T25865] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 601.063521][T25847] UDF-fs: Scanning with blocksize 4096 failed [ 601.070869][T25865] UDF-fs: Scanning with blocksize 1024 failed [ 601.071105][T25847] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 01:16:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) sched_getaffinity(r1, 0x8, &(0x7f0000000180)) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x4, 0x84) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) semop(0x0, &(0x7f0000000280)=[{0x0, 0x3}, {}], 0x2) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x3, 0x0, 0x0, 0x0, 0x0, 0x40, 0x100}, 0x3, 0x80, 0x8}) 01:16:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0x1, 0x20043473, &(0x7f000031e000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 01:16:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback, 0xfe800000}, 0x1c) [ 601.125592][T25852] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 601.138447][T25865] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256 [ 601.158717][T25875] ------------[ cut here ]------------ [ 601.166671][T25875] generic_make_request: Trying to write to read-only block-device nullb0 (partno 0) [ 601.186074][T25865] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512 [ 601.201150][T25852] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 601.225577][T25875] WARNING: CPU: 0 PID: 25875 at block/blk-core.c:797 generic_make_request_checks+0x1d5c/0x2210 [ 601.235932][T25875] Kernel panic - not syncing: panic_on_warn set ... [ 601.242540][T25875] CPU: 0 PID: 25875 Comm: syz-executor.0 Not tainted 5.4.0-rc7+ #0 [ 601.250429][T25875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 601.260485][T25875] Call Trace: [ 601.263788][T25875] dump_stack+0x197/0x210 [ 601.268129][T25875] ? generic_make_request_checks+0x1d00/0x2210 [ 601.274286][T25875] panic+0x2e3/0x75c [ 601.278192][T25875] ? add_taint.cold+0x16/0x16 [ 601.282882][T25875] ? __kasan_check_write+0x14/0x20 [ 601.287995][T25875] ? __warn.cold+0x14/0x35 [ 601.292415][T25875] ? __warn+0xd9/0x1d0 [ 601.296492][T25875] ? generic_make_request_checks+0x1d5c/0x2210 [ 601.302644][T25875] __warn.cold+0x2f/0x35 [ 601.306889][T25875] ? generic_make_request_checks+0x1d5c/0x2210 [ 601.311234][T25865] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found [ 601.313043][T25875] report_bug+0x289/0x300 [ 601.313084][T25875] do_error_trap+0x11b/0x200 [ 601.313104][T25875] do_invalid_op+0x37/0x50 [ 601.331234][T25865] UDF-fs: Scanning with blocksize 2048 failed [ 601.334034][T25875] ? generic_make_request_checks+0x1d5c/0x2210 [ 601.334055][T25875] invalid_op+0x23/0x30 [ 601.334072][T25875] RIP: 0010:generic_make_request_checks+0x1d5c/0x2210 [ 601.334090][T25875] Code: 00 00 44 8b ab 3c 05 00 00 48 8d b5 78 ff ff ff 4c 89 f7 e8 c6 87 05 00 48 c7 c7 60 18 e5 87 48 89 c6 44 89 ea e8 7c f9 13 fe <0f> 0b 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 80 3c 02 [ 601.376743][T25875] RSP: 0018:ffff88805a356f60 EFLAGS: 00010282 [ 601.382797][T25875] RAX: 0000000000000000 RBX: ffff8880a2f0c000 RCX: 0000000000000000 [ 601.390756][T25875] RDX: 0000000000000000 RSI: ffffffff815cf766 RDI: ffffed100b46adde [ 601.398711][T25875] RBP: ffff88805a357060 R08: ffff888057724600 R09: ffffed1015d04101 [ 601.406667][T25875] R10: ffffed1015d04100 R11: ffff8880ae820807 R12: ffff888091ec8908 [ 601.414623][T25875] R13: 0000000000000000 R14: ffff888091ec8900 R15: ffff8880a2f5eef8 [ 601.422601][T25875] ? vprintk_func+0x86/0x189 [ 601.427203][T25875] ? trace_event_raw_event_block_rq_requeue+0x640/0x640 [ 601.434123][T25875] ? __kasan_check_read+0x11/0x20 [ 601.439131][T25875] ? __lock_acquire+0x8a0/0x4a00 [ 601.444052][T25875] ? __kasan_check_read+0x11/0x20 [ 601.449067][T25875] generic_make_request+0x8f/0xb50 [ 601.454165][T25875] ? blk_queue_enter+0xe50/0xe50 [ 601.459091][T25875] ? lock_downgrade+0x920/0x920 [ 601.463929][T25875] submit_bio+0x113/0x600 [ 601.468241][T25875] ? submit_bio+0x113/0x600 [ 601.472730][T25875] ? generic_make_request+0xb50/0xb50 [ 601.478086][T25875] ? bio_associate_blkg_from_css+0x50c/0x990 [ 601.484051][T25875] ? bio_reset+0x3b0/0x3b0 [ 601.488451][T25875] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 601.494151][T25875] ? guard_bio_eod+0x294/0x6c0 [ 601.498894][T25875] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 601.504596][T25875] submit_bh_wbc+0x6b6/0x900 [ 601.509172][T25875] __block_write_full_page+0x7fe/0x11b0 [ 601.514699][T25875] ? bdev_evict_inode+0x5c0/0x5c0 [ 601.519706][T25875] ? __getblk_gfp+0xa10/0xa10 [ 601.524371][T25875] block_write_full_page+0x21f/0x270 [ 601.529635][T25875] ? bdev_evict_inode+0x5c0/0x5c0 [ 601.534643][T25875] blkdev_writepage+0x25/0x30 [ 601.539305][T25875] __writepage+0x66/0x110 [ 601.543619][T25875] write_cache_pages+0x80c/0x13f0 [ 601.548748][T25875] ? tag_pages_for_writeback+0x4b0/0x4b0 [ 601.554371][T25875] ? clear_page_dirty_for_io+0xde0/0xde0 [ 601.559983][T25875] ? lock_downgrade+0x920/0x920 [ 601.564819][T25875] ? ep_poll_callback+0x730/0xe70 [ 601.569828][T25875] ? __kasan_check_read+0x11/0x20 [ 601.574837][T25875] ? mark_lock+0xc2/0x1220 [ 601.579236][T25875] ? __kasan_check_read+0x11/0x20 [ 601.584242][T25875] ? mark_lock+0xc2/0x1220 [ 601.588649][T25875] generic_writepages+0xed/0x160 [ 601.593580][T25875] ? write_cache_pages+0x13f0/0x13f0 [ 601.598849][T25875] ? __lock_acquire+0x8a0/0x4a00 [ 601.603777][T25875] ? wbc_attach_and_unlock_inode+0x51a/0xa00 [ 601.609741][T25875] ? find_held_lock+0x35/0x130 [ 601.614492][T25875] ? blkdev_readpages+0x40/0x40 [ 601.619325][T25875] blkdev_writepages+0x1e/0x30 [ 601.624075][T25875] do_writepages+0xfa/0x2a0 [ 601.628568][T25875] ? page_writeback_cpu_online+0x20/0x20 [ 601.634183][T25875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 601.640409][T25875] ? do_raw_spin_unlock+0x178/0x270 [ 601.645596][T25875] ? _raw_spin_unlock+0x2d/0x50 [ 601.650429][T25875] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 601.656655][T25875] ? wbc_attach_and_unlock_inode+0x63c/0xa00 [ 601.662620][T25875] __filemap_fdatawrite_range+0x2bc/0x3b0 [ 601.668496][T25875] ? delete_from_page_cache_batch+0xfe0/0xfe0 [ 601.674575][T25875] ? lock_downgrade+0x920/0x920 [ 601.679419][T25875] filemap_write_and_wait+0xf8/0x1e0 [ 601.684693][T25875] __blkdev_put+0x204/0x810 [ 601.689189][T25875] ? bd_set_size+0xb0/0xb0 [ 601.693608][T25875] ? wait_for_completion+0x440/0x440 [ 601.698888][T25875] blkdev_put+0x98/0x560 [ 601.703138][T25875] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 601.709381][T25875] blkdev_close+0x8b/0xb0 [ 601.713699][T25875] __fput+0x2ff/0x890 [ 601.717664][T25875] ? blkdev_put+0x560/0x560 [ 601.722156][T25875] ____fput+0x16/0x20 [ 601.726129][T25875] task_work_run+0x145/0x1c0 [ 601.730719][T25875] do_exit+0x904/0x2e60 [ 601.734872][T25875] ? mm_update_next_owner+0x640/0x640 [ 601.740240][T25875] ? lock_downgrade+0x920/0x920 [ 601.745081][T25875] ? _raw_spin_unlock_irq+0x28/0x90 [ 601.750265][T25875] ? get_signal+0x392/0x2500 [ 601.754844][T25875] ? _raw_spin_unlock_irq+0x28/0x90 [ 601.760028][T25875] do_group_exit+0x135/0x360 [ 601.764608][T25875] get_signal+0x47c/0x2500 [ 601.769013][T25875] ? lock_downgrade+0x920/0x920 [ 601.773855][T25875] do_signal+0x87/0x1700 [ 601.778081][T25875] ? __kasan_check_read+0x11/0x20 [ 601.783115][T25875] ? _copy_to_user+0x118/0x160 [ 601.787865][T25875] ? setup_sigcontext+0x7d0/0x7d0 [ 601.792879][T25875] ? exit_to_usermode_loop+0x43/0x380 [ 601.798229][T25875] ? do_syscall_64+0x65f/0x760 [ 601.802985][T25875] ? exit_to_usermode_loop+0x43/0x380 [ 601.808341][T25875] ? lockdep_hardirqs_on+0x421/0x5e0 [ 601.813609][T25875] ? trace_hardirqs_on+0x67/0x240 [ 601.818617][T25875] exit_to_usermode_loop+0x286/0x380 [ 601.823886][T25875] do_syscall_64+0x65f/0x760 [ 601.828458][T25875] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 601.834333][T25875] RIP: 0033:0x45a639 [ 601.838210][T25875] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 601.857794][T25875] RSP: 002b:00007fe6f9606cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 601.866185][T25875] RAX: fffffffffffffe00 RBX: 000000000075bfd0 RCX: 000000000045a639 [ 601.874136][T25875] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bfd0 [ 601.882085][T25875] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 601.890035][T25875] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bfd4 [ 601.897986][T25875] R13: 00007ffca9831baf R14: 00007fe6f96079c0 R15: 000000000075bfd4 [ 601.907728][T25875] Kernel Offset: disabled [ 601.912203][T25875] Rebooting in 86400 seconds..