, 0xfd}, {&(0x7f0000000c80)="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", 0x1000}, {&(0x7f0000000040)="2e949cd5892a78478876138ef98d04700e099e9d37a1a98b", 0x18}, {&(0x7f0000000340)="f3d374879305087f221f757006735936fb233367b8ed872610af7782880034b464438c5a07206d176297471da40677649be39e522d55afe23d9b227e7efe189c81d7c57acdc9063158da896ed5deaa14ffdc11504f1a1ba4ef124e0ce3328d893bd7837e42c8534acdf5c83fdf0eb7860cc53ac0d592e2a6da201e3425a94fa797856d3e01e134bffc4601549db16a6103f79003acfe6f3b724e441deffde0c2d3d935412fefe8555f2075f3bf067ba2b6f1324657534afa4bab0e", 0xbb}, {&(0x7f0000000140)="b1fcf85c50b67a59aec8089f41b1f928bbd4f68b085e", 0x16}, {&(0x7f0000000400)="ecc1fdd926b17b71645648e41d594e3049533bdbea14c8daace577097064fd533013de9bd7604dde70e11f32dd36e6aae724cd2e38aab3839541bc2c3f7df462eb8a2e414b155487874686930695ea9e4be6b812203b2610b85244f45b98e4201d5f8ea1bafda6cad25fa61dcb252579f3edcf657030378b98a565833100185741fafafe42ea0f3ebf8e58a6e78e2409eb1c9d32a11047c27d80f6af0b2e1198ec842aa357882c33f9515e39db7ec1f508ecf2", 0xb3}, {&(0x7f00000004c0)="1d8d6a9650d39b31debac80e230eb80e9cb09a99e8632dd93b357abb84c37a370d587f3e99b4981a8da4f6b4158cd182c6e50ad095e4a5878ef1cd67ed660b87888d268bd6e482e5ec018458928c3e0344ecd4172c7cdf", 0x57}, {&(0x7f0000000540)="1eb423906211b290c63b4a4ab1ff4ee273f2af9ad4ea3b72c19598daab0549264d21e1f90062e2b974c326431026c89b6a1ee5012263461f705ec335fc20128f4eab71a0371f24d2f8efa49e2e219e12a82ecb76394f5d", 0x57}], 0x8) prctl$PR_SET_FPEXC(0xc, 0x80001) dup3(r1, r2, 0x0) 04:03:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000440)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x9b\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac\x89\xc3\xb9\x87\x98\xcd\xc3\xec\xb1\xfbt\xeb)l\xc91\xd6:2\x8a\xd7\xec\x91b%\x02H9\\\x8fhg6\x94\t\x0e@\x93W\x89C\x17\xa7\x98Js\xc8@:\t\xdb\x0epx\"\x05\x87\xc8\x93\xde\x90\xb8sgOo\xe4\xc2\x86\xee3po\xfe\xc0\xfe\xa5\xae\xed\xc2\xde\xd9A\xffe\xc6+\xf7x\x9a\r\x82\xbc\xc6\xc9{\xc9\x7f\xb5\xada\x8e~k\xc1b\xf9\xd2_4\xad3Zz\x18\x0e\xd7;<\\\x1b\xb5dC5\xfek\xffbas\xe0\x16\x19\xbfu7J\"7\xc9\xde\xf6\xd7:\x9a\n+\xa4j\xe6\xfa&\xa4\xba\'\xf7\xde\x11+\xd4o6\x84mw\xd2g\xa1\b\xc1F\xb8~\xc5\xec\xb2z\x19\xb4\xbeA\x9b\x00\xb9\b\xa7e7\xcd>\xf3\x9b\xcdS\n0\'\x7f\x80\n\xe5R\x9f\xa8y\xf1\x858B\xf2\xb7\x04\xbd\xe3\b\xfaX\xeb&\x8fT\xb4\xcb\n\xb8\x8fU\xef\xba(\xdc\x17\xdb,V\xa8B\xd8\xa6\xf4\x84', 0x0) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x240100, 0x0) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f0000000140)) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:03:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:03:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x0, 0x0) 04:03:49 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000180)=0x3) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:03:49 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={[], 0x165, 0xea, 0x100000000, 0xc, 0x2, r1}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) r4 = fcntl$dupfd(r0, 0x406, r0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'lapb0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x6, r5, 0x1, 0x5, 0x6, @broadcast}, 0x14) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r0, &(0x7f0000000040), 0x7) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000010000000000000004499524060011704ed604e2d0acd5fd3644219a3e6ff5d1000000000000001000000000d9b800204dc51380ddcf280453c27182a190810cd8002c02bf2722204864ba4a7f399cf350c4fdcea5fe78bc0ae179e37e71f15f"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:03:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:03:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:03:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:03:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) getpgrp(0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) r4 = gettid() r5 = getpgid(r4) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x1ff, 0x0, 0x4b3, 0x1, 0x0, 0x10001, 0x0, 0x4, 0x2, 0x100000001, 0x6, 0x784fb412, 0x1ff, 0x6, 0x20, 0x1000, 0x6, 0x4, 0x5, 0x81, 0x9, 0x401, 0x9, 0x7, 0x4, 0x3, 0x0, 0x5, 0x9, 0xffffffffffff0cd8, 0x1, 0x4, 0x3, 0x0, 0x7, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000040)}, 0x0, 0x48000000, 0x81, 0x8, 0x3f, 0xc2, 0x60b}, r5, 0xffffffffffffffff, r6, 0x0) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:03:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2, 0x104) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x5d) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) r4 = getpgrp(0xffffffffffffffff) sched_setparam(r4, &(0x7f0000000040)=0x3) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='\x90ystem\x01\xbe\xb8.posi\x04\x00acl_ac\xe3ess\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) dup3(r2, r3, 0x0) 04:03:50 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x2, 0x0, [0x0, 0x0]}) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) [ 612.304320] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 04:03:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:03:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000180)=""/159, 0x9f}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x802) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2a80, 0x2, 0x0, 0x800e00506) shutdown(r1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet(r2, 0x0, 0x1789836bed901fc7, 0x2, 0x0, 0x800e0050e) shutdown(r2, 0x0) 04:03:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000180)=""/159, 0x9f}, {0x0}, {0x0}, {0x0}], 0x4}, 0x802) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2a80, 0x2, 0x0, 0x800e00506) shutdown(r1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet(r2, 0x0, 0x1789836bed901fc7, 0x2, 0x0, 0x800e0050e) shutdown(r2, 0x0) 04:03:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:03:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) ioctl$FICLONE(r2, 0x40049409, r3) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0faffffffffffffff6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:03:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = memfd_create(&(0x7f0000000240)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00', 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r2 = creat(&(0x7f0000000300)='./file0\x00', 0x1) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000340)={0x80000001, 0x140, 0x0, 0x6, 0xc9, 0x9}) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000140)=0x1e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000380)=""/114) r4 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r3, r4, &(0x7f0000000000), 0xffff) fcntl$addseals(r4, 0x409, 0x8) fsetxattr$system_posix_acl(r4, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f00000002c0)={0x0, 0x1f, 0x2, 0x6, 0x100000000}) dup3(r3, r4, 0x10000000) 04:03:50 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) chroot(&(0x7f0000000080)='./file0/file0\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:03:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:03:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x154}, {&(0x7f00000024c0)=""/4096, 0x113c}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0xcd, 0x6, &(0x7f0000003700)={0x77359400}) 04:03:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x154}, {&(0x7f00000024c0)=""/4096, 0x113c}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0xcd, 0x6, &(0x7f0000003700)={0x77359400}) 04:03:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x4) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) 04:03:50 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000100)=@caif=@dgm={0x25, 0x8}, 0x172, 0x0}}], 0x1, 0x0) 04:03:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r2, r3, 0x0) 04:03:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$unix(0x1, 0x2000000000001, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r2, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) shutdown(r3, 0x2) 04:03:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="275a61635e0bcfec7be070e56ad7") socketpair$unix(0x1, 0x400000000001, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000040)=@buf={0x98, &(0x7f00000001c0)="8086ea0c0053d849e8c5b4d3ba5d0d778967858064ab744a1608106d42ca084891adbbaf6864f9f2c228644e3787a40ca0f08726054eaa2266e4a47545fbebe4a8b01d330fced031197034e046be33a9c9740c217ffc01b0fbec8ce6df76656cc7398d745154a7a4ab47a48fb23cce4e15973ac1d8373cfcdf41656a80ed972de7cf367878ee465f0262b8cff78223db1a74039c62d8747e"}) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:03:50 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000006900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[{0x10}], 0x10}}], 0x1, 0x0) 04:03:50 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={[], 0x165, 0xea, 0x100000000, 0xc, 0x2, r1}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:03:51 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, 0x0, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x0, 0x0) 04:03:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x800, 0x0) ioctl$KDADDIO(r3, 0x4b34, 0xffffffffffff0001) r4 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r4, &(0x7f0000000000), 0xffff) fcntl$addseals(r4, 0x409, 0x8) fsetxattr$system_posix_acl(r4, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r4, 0x0) 04:03:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000040)=ANY=[], 0x0, 0x0) dup3(r1, r2, 0x0) 04:03:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:03:51 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000140)={0x2, 0x0, 0x36b, 0x2bd17586, 0x81, 0x6}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x0, 0x0) 04:03:51 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f0000000480)={0x7fff}, 0x8, 0x80000) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x800, 0x6c, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f00000002c0)={@remote, @broadcast, 0x0}, &(0x7f0000000300)=0xc) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r2, 0xf21, 0x70bd29, 0x25dfdbfd, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xc37f299edc70f1b3}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x4000) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r4 = getpgrp(0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000180)) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r4, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180)=""/211, &(0x7f0000000040)=0xd3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:03:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = dup2(r0, r0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000040)='ppp0vmnet0*\\\x00', 0x0) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="100000e9ffe8cbb487990000e800"], 0x1, 0x2) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x2488c1, 0x0) ioctl$EVIOCGNAME(r4, 0x80404506, &(0x7f0000000c80)=""/4096) dup3(r2, r3, 0x0) [ 614.074363] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 04:03:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="1000000000000000200000000000618e4a6413675ddd430000ca84204aa0dfcefc55378e1916a2f5a9a54dfd8ccba98ed23e55"], 0x1, 0x0) dup3(r1, r2, 0x0) 04:03:52 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x401}], 0x1, 0x0) 04:03:52 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:03:52 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0xfffffffffffffffd, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000008b74a608d604e2d0acd5fd3644219a3e6f75d100000000000000100000000000000020000000000000005ee5bbc0a51d377f7cebcf7c3a5b898d1ffd2e"], 0x1, 0x0) r4 = dup3(r1, r3, 0x0) ioctl$BLKBSZGET(r4, 0x80081270, &(0x7f0000000040)) 04:03:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:03:52 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0xfffffffffffffffd, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:52 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) clone(0x200000, &(0x7f0000000140)="1b7ec85c50d10c5c4d56f93eebe57821c2b93a566f45c234bea49ed0d6dae845b470345551e22a70fc14140c519dc0c7b0c10a6bcb399981e250a31dffe8c3de94c7050633ca5f11ed775b3e0bb1476a229bbeceb7778108f2c5fd6ca7192afbf26a2006a50574c3938aef88166d688814ebcec801500737ffea63aecc8f985b74cf01b7b65c6486165d1f433ce49ff50882a51670a1d78d2580a8f19a0ea5343a252cff9e2cff34aa8876d8026f434d05e97a67569c4b", &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)="8ccbdf8fe2c4f7deaf6f1d043ac169dae88b802b87ad3cd9bf3cf86c129d3c7a0ed9f27e7a9e3ea03348c55b22f4b5d0e532cc4abd0c698607cca7ccb6a55da247fa5959fed40e9cec9510d310e826bcafe23c317fb91f53a212b42ec460ba73fd13615c272eb4e2a282fd6ce8f9ac5e7939e11f4a408d56115f41dfcc34546e906d38d5bebd2b16c12c4f9080a561283bdc468b257d6dd84d2ec760f9") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0095ce2b5e9c9645b03b0000000030000000000000030000000000000000000000000073ccbc731c152ce18b20c9857ff608effd45713105b64bcb374e02382a317096ffa5df769a6a9d3ef059c47529465f3052356bd4eab7a2312ac3a26cdeee06df5957044352230b783936de53b68c85b6017bc95f0f452873f51ecfcdafc32871362fb1e051fae55c5a3ecad1da14e441935991b4c199625c42adfcc0f45e9803ee3c3f23de87e15d0e75de8918faa5862f7e52006d"]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) [ 614.916722] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 04:03:52 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) clone(0x200000, &(0x7f0000000140)="1b7ec85c50d10c5c4d56f93eebe57821c2b93a566f45c234bea49ed0d6dae845b470345551e22a70fc14140c519dc0c7b0c10a6bcb399981e250a31dffe8c3de94c7050633ca5f11ed775b3e0bb1476a229bbeceb7778108f2c5fd6ca7192afbf26a2006a50574c3938aef88166d688814ebcec801500737ffea63aecc8f985b74cf01b7b65c6486165d1f433ce49ff50882a51670a1d78d2580a8f19a0ea5343a252cff9e2cff34aa8876d8026f434d05e97a67569c4b", &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)="8ccbdf8fe2c4f7deaf6f1d043ac169dae88b802b87ad3cd9bf3cf86c129d3c7a0ed9f27e7a9e3ea03348c55b22f4b5d0e532cc4abd0c698607cca7ccb6a55da247fa5959fed40e9cec9510d310e826bcafe23c317fb91f53a212b42ec460ba73fd13615c272eb4e2a282fd6ce8f9ac5e7939e11f4a408d56115f41dfcc34546e906d38d5bebd2b16c12c4f9080a561283bdc468b257d6dd84d2ec760f9") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:03:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = memfd_create(&(0x7f0000000680)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00[ndp\x91\xaf\xde\x9d\x97w\xccp\x06-\xc4eCA{#\xf5\xf4K\x88g\xfd\x958\xa0~\xe1\xe3\x13O\xafH\xec\x1f\x01\xbf\xdc\xd8s\xaf7>\xbb\x14\x8b^\x88\x89oB\x964\xb1f\x98P\xe4\xdd\x9c\x10!\x06\xca8\xe1\xc6\xe0\x06\xaa\xb8\xd7\x89\x9c\xc4w\x18\x94\xd5%<\x81.\x10hH\x04\xf9\x1e\xf1\xcf\xc1\xa0D\xc5\\\xc7n\xb8\xea\xd4u\x96\x0e\x96\xdb\xe9y\xb7\xab\x92\xc0v\xc7\xe3\xfa\xe8uy5\xfe\xe4\r\x86)\xff\xa9FU\x9dL\xcc\x1a\xa95PK\xe5IB\x96\xd8\xe3\xeed\xe2 \xb2', 0x2) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) fsetxattr$system_posix_acl(r1, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) preadv(r2, &(0x7f0000000300)=[{&(0x7f0000000c80)=""/4096, 0x1000}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000000040)=""/18, 0x12}, {&(0x7f0000000080)}, {&(0x7f0000000240)=""/170, 0xaa}], 0x5, 0x0) 04:03:52 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) clone(0x200000, &(0x7f0000000140)="1b7ec85c50d10c5c4d56f93eebe57821c2b93a566f45c234bea49ed0d6dae845b470345551e22a70fc14140c519dc0c7b0c10a6bcb399981e250a31dffe8c3de94c7050633ca5f11ed775b3e0bb1476a229bbeceb7778108f2c5fd6ca7192afbf26a2006a50574c3938aef88166d688814ebcec801500737ffea63aecc8f985b74cf01b7b65c6486165d1f433ce49ff50882a51670a1d78d2580a8f19a0ea5343a252cff9e2cff34aa8876d8026f434d05e97a67569c4b", &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)="8ccbdf8fe2c4f7deaf6f1d043ac169dae88b802b87ad3cd9bf3cf86c129d3c7a0ed9f27e7a9e3ea03348c55b22f4b5d0e532cc4abd0c698607cca7ccb6a55da247fa5959fed40e9cec9510d310e826bcafe23c317fb91f53a212b42ec460ba73fd13615c272eb4e2a282fd6ce8f9ac5e7939e11f4a408d56115f41dfcc34546e906d38d5bebd2b16c12c4f9080a561283bdc468b257d6dd84d2ec760f9") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='vxfs\x00', 0x800020, &(0x7f0000000280)='system.posix_acl_access\x00') r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0020000043a6000000"], 0x1, 0x0) dup3(r1, r2, 0x0) 04:03:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xfffd) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r2, 0x0) 04:03:52 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) write$P9_RFSYNC(r4, &(0x7f0000000180)={0x7, 0x33, 0x2}, 0x7) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd1e44219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:03:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r3, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x4) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000140), &(0x7f0000000240)) r5 = fcntl$dupfd(r2, 0x406, r1) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x218000) ioctl$BLKGETSIZE(r5, 0x1260, &(0x7f0000000440)) setresuid(r4, r6, r7) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) fsetxattr$system_posix_acl(r3, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r2, r3, 0x0) 04:03:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:03:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) 04:03:53 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=""/185, 0xb9) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000004000000001, 0x81) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='\xf8\xfft4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x100000, 0x0) 04:03:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:03:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:03:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xfffffffffffffeec) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x5a000, 0x18) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000280)) fsetxattr$system_posix_acl(r3, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r2, r3, 0x0) 04:03:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) sendfile(r2, r3, &(0x7f0000000000), 0xffff) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000180)=@add_del={0x2, &(0x7f0000000040)='bcsh0\x00'}) fcntl$addseals(r3, 0x409, 0x8) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="64363e14f7a739d32f02000000303a4d28fdb1a28be1000040b7299c04e2d0acd5fd3644219a3e6f"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:03:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:53 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = inotify_init1(0x8000000000801) inotify_add_watch(r0, &(0x7f0000000580)='./file0\x00', 0xa400294c) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=@random={'system.', 'fd'}, &(0x7f0000000340)='fuse\x00', 0x5, 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000380)=0xffff) rmdir(&(0x7f0000000040)='./file0\x00') dup2(r0, r1) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:user_cron_spool_t:s0\x00', 0x27, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:03:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 04:03:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r2, 0x0) 04:03:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 04:03:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:03:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:03:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) [ 616.157928] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 616.178106] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 616.192497] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:03:53 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) ioctl(r0, 0x9, &(0x7f0000000140)="71dabf59616e5f822b839a46cf6c515cee89f81c04837cba3046be1f3a0366cac56ed59aa3a75c1c73bbba5e8d5e621aac7341952d1c205d1329afa053b691a2908f7eed68f5bf9e8425ee641c4e76027753004d14cf5edd6cc0335deb5afc28f2e967") syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) [ 616.207510] EXT4-fs error (device loop5): ext4_iget:4542: inode #2: comm syz-executor.5: root inode unallocated [ 616.219433] EXT4-fs (loop5): get root inode failed [ 616.224790] EXT4-fs (loop5): mount failed 04:03:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r2, &(0x7f0000000000), 0x3) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r2, 0x0) 04:03:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000}}, 0x30) 04:03:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="1000000000001900200000000000000067c877a0ef11548e21eb52f482b7c4f0c43f8e8192e82e3053ae5e0dde7f7c663b580decb09b3942f7773c3683ed5aac3ae03bf3d9bacf43a134a15b98a59a1e542c0f1664d79f02626ab29cf0520da4cfc416d7ac35e9"], 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$TIOCSRS485(r3, 0x542f, &(0x7f0000000040)={0x1, 0x0, 0x9d}) 04:03:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) rmdir(&(0x7f0000000080)='./file0\x00') write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:03:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000}}, 0x30) 04:03:54 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f00000003c0)="8e0ac143293267bf75df048a5eb4bfcf31094dd6ce4e3f387edfd18c3dd23f18765b822b8867845211eb", 0x2a, 0xfffffffffffffffb) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0)='\xc8\xe2\x1cii\xf4\xccs\xc9\x92\xe9\xf1\xb4\b\xe6\xe7\xa0\xc1\xc0}8@\a\xe0Y\x04+Lf\x96\x8a\xa5P\xdd\xd1]\xe7\xbdZs,\xf9\xc9\xefS^\xf92G\v\xcc}\xdc[\x87\xdaX\xd0\xd6-K\x982~\x83\x99\x02\x14X\rH\x1a\xf7u\xe4\xc8w^\x02\xef\xb8\x85\xa6_\xe2g\n\xe5k,\b)n\xec\x87\x16P\xb4\xfa\xd5\xcf\x92ro9\x90\xe5\xc8\xef\xbas\xa8\xa3\x1e\"\xb5\xea\xd1\x9d\xa4\xa2\xea&\xfe\xb9\xa6<\xe9\xdc\x0fFg\x8b\xb3J\xcbH\x14\xbc\x91\x1bx.X9\x14\x17[\xe2\"&\x18<\x90\xda\xa1_2\xd9\x04\x97Q%\x017\xde\xd5\xf7I#a\xd2?4\xa1\x84dY\xff\xe44y\x8f\xeb\xc9\x04D\\\xe4\x8a\xa1~xu\x1d\xa6\xec_5\x80\xfa', r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000140)=0xfe1b) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8a03, 0x7) 04:03:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000340)='lo\'keyring\x00', 0x7) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) pread64(r1, &(0x7f0000000240)=""/228, 0xe4, 0x0) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r2, r3, 0x0) 04:03:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000}}, 0x30) 04:03:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000040), 0xffff) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x8200, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)={0xb, 'syz0\x00', 'syz1\x00', 'syz0\x00', 0x18, 0xf7, 0xf9, 0xffff, 0x6, 0x101, "3f5a6ce0b9234d3cf5335bd00e3342df32f10f50e0f9bfa8"}, 0x130) fcntl$addseals(r2, 0x409, 0x2) write$ppp(r3, &(0x7f0000000380)="5476bf92007b8e4e51ea2ad47d97459d54d8989e64d3fb559ad36abbed60718434665e7947183bd27a41e247f8607da168693f7ce93c83a72fda50e17f2ff7151f7f6f33809fe28abd1758577d1cfc979cccc836b19c6dc52dd2e55ae58cddcc55e6d3368c3b5c31e15ca9404da17e7451b9fb9856f10dad08c3148d1aa76422640d1c61af2a2c85f00c0b5fe44f263ca56abeac14dfa2f65246a3ec1eb3cd754098790cf54a8acc185d25501deba3c812d30857521aff2b0f2bdb1fa42f87482cd70438c1bf899ae326f3a7b32a70154bbd8504dbf37dd0ec67cf39882dfbf9ec8a772f0a03d4b1343862093a64a0", 0xef) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200283, 0x0) ioctl$VT_ACTIVATE(r4, 0x5606, 0x100) dup3(r1, r2, 0x0) 04:03:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) r4 = dup2(r2, r1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000240)=r4, 0x4) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000004a00002000000000000000"], 0x1, 0x0) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) write$apparmor_current(r5, &(0x7f0000000140)=@profile={'changeprofile ', '!selfproc%cpusetkeyringlovmnet1proc\x00'}, 0x32) dup3(r2, r3, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000280)=0x0) sched_getaffinity(r6, 0x8, &(0x7f00000002c0)) 04:03:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000001c0)=0xe8) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r2, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x10}}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x80) socketpair$unix(0x1, 0x9, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r6, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r5, r6, &(0x7f0000000000), 0xffff) fcntl$addseals(r6, 0x409, 0x8) fsetxattr$system_posix_acl(r6, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5a347a839371bfd3644219a3e6ff5d1000000000000001000000000dc09740c54225002000000"], 0x1, 0x0) dup3(r4, r6, 0x0) 04:03:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) dup3(r1, r2, 0x0) [ 617.288397] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 617.316657] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 617.353371] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 617.395016] EXT4-fs error (device loop5): ext4_iget:4542: inode #2: comm syz-executor.5: root inode unallocated [ 617.423325] EXT4-fs (loop5): get root inode failed [ 617.438625] EXT4-fs (loop5): mount failed 04:03:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f00000000c0)=0xe8) r2 = getgid() mount$fuse(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000640)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',blksize=0x0000000000000c00,fowner=', @ANYRESDEC=r1, @ANYBLOB=',uid>', @ANYRESDEC=r1, @ANYBLOB=',fowner>', @ANYRESDEC=r1, @ANYBLOB=',dont_hash,obj_role=/dev/fuse<]\x00']) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) prctl$PR_GET_NO_NEW_PRIVS(0x27) 04:03:55 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000140)={r0, 0x37, 0x5c}, &(0x7f0000000280)={'enc=', 'oaep', ' hash=', {'sha224-arm64-neon\x00'}}, &(0x7f0000000200)="953e89245c10990549df6fe42cb299c591e04dc11c2daba67b443b51c0c3dea7189280cb598eaa8b894ebab915c39be6b42214559bf34b", &(0x7f0000000300)=""/92) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r1, 0x0, 0x8800000) 04:03:55 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$TCSBRKP(r0, 0x5425, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000180)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>eJ\x02u\x9b\x94a\xac\x83\x11\xf4Y\xf4\xb6\xb6kwg\x84c{ajc\x87Xa\xf4\x047\x15\xc0!,\x98u\xdb%Aw\x06\xcc\xa8,\xca\x04\xe5\x00\x00\x00', 0x3) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r3, r4, &(0x7f0000000000), 0xffff) fcntl$addseals(r4, 0x409, 0x8) fsetxattr$system_posix_acl(r1, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000100)=ANY=[@ANYRES64=r3], 0x1, 0x3) dup3(r2, r4, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000200)=0x1) memfd_create(&(0x7f0000000080)='\x00', 0x4) 04:03:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) dup3(r1, r2, 0x0) 04:03:55 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f00000003c0)="8e0ac143293267bf75df048a5eb4bfcf31094dd6ce4e3f387edfd18c3dd23f18765b822b8867845211eb", 0x2a, 0xfffffffffffffffb) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0)='\xc8\xe2\x1cii\xf4\xccs\xc9\x92\xe9\xf1\xb4\b\xe6\xe7\xa0\xc1\xc0}8@\a\xe0Y\x04+Lf\x96\x8a\xa5P\xdd\xd1]\xe7\xbdZs,\xf9\xc9\xefS^\xf92G\v\xcc}\xdc[\x87\xdaX\xd0\xd6-K\x982~\x83\x99\x02\x14X\rH\x1a\xf7u\xe4\xc8w^\x02\xef\xb8\x85\xa6_\xe2g\n\xe5k,\b)n\xec\x87\x16P\xb4\xfa\xd5\xcf\x92ro9\x90\xe5\xc8\xef\xbas\xa8\xa3\x1e\"\xb5\xea\xd1\x9d\xa4\xa2\xea&\xfe\xb9\xa6<\xe9\xdc\x0fFg\x8b\xb3J\xcbH\x14\xbc\x91\x1bx.X9\x14\x17[\xe2\"&\x18<\x90\xda\xa1_2\xd9\x04\x97Q%\x017\xde\xd5\xf7I#a\xd2?4\xa1\x84dY\xff\xe44y\x8f\xeb\xc9\x04D\\\xe4\x8a\xa1~xu\x1d\xa6\xec_5\x80\xfa', r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000140)=0xfe1b) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:55 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f00000003c0)="8e0ac143293267bf75df048a5eb4bfcf31094dd6ce4e3f387edfd18c3dd23f18765b822b8867845211eb", 0x2a, 0xfffffffffffffffb) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0)='\xc8\xe2\x1cii\xf4\xccs\xc9\x92\xe9\xf1\xb4\b\xe6\xe7\xa0\xc1\xc0}8@\a\xe0Y\x04+Lf\x96\x8a\xa5P\xdd\xd1]\xe7\xbdZs,\xf9\xc9\xefS^\xf92G\v\xcc}\xdc[\x87\xdaX\xd0\xd6-K\x982~\x83\x99\x02\x14X\rH\x1a\xf7u\xe4\xc8w^\x02\xef\xb8\x85\xa6_\xe2g\n\xe5k,\b)n\xec\x87\x16P\xb4\xfa\xd5\xcf\x92ro9\x90\xe5\xc8\xef\xbas\xa8\xa3\x1e\"\xb5\xea\xd1\x9d\xa4\xa2\xea&\xfe\xb9\xa6<\xe9\xdc\x0fFg\x8b\xb3J\xcbH\x14\xbc\x91\x1bx.X9\x14\x17[\xe2\"&\x18<\x90\xda\xa1_2\xd9\x04\x97Q%\x017\xde\xd5\xf7I#a\xd2?4\xa1\x84dY\xff\xe44y\x8f\xeb\xc9\x04D\\\xe4\x8a\xa1~xu\x1d\xa6\xec_5\x80\xfa', r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000140)=0xfe1b) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303032303030303030303030303034303030302c757365725f69643d5e7b8a40f194931ab205d8c140037d347c6a406570924d04d35455ec651feeb269123e84", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:03:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x44e000, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000240)={0x3, &(0x7f0000000140)=[{0x6, 0x8, 0xa6}, {0x7, 0x7fffffff, 0x401, 0xc05}, {0x1, 0xfffffffffffffffb, 0x8, 0x4}]}) dup3(r1, r2, 0x0) 04:03:55 executing program 1: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat(r1, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000000)=""/47) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000540)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000180)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_gfeatures={0x3a, 0x8, [{0x7, 0x0, 0x7, 0x3}, {0xff, 0xfffffffffffff5f7, 0xfffffffffffffffe, 0x7}, {0x6, 0x3, 0x2000000, 0xffff}, {0x9, 0x4, 0x3, 0x3f}, {0x2, 0x1, 0x401, 0x8000}, {0x9, 0x4, 0x2, 0x40}, {0x401, 0x7, 0x3, 0x1ff}, {0x20, 0x80000001, 0x7f, 0x2e}]}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000140)) 04:03:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000180)) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) io_setup(0x5, &(0x7f0000000400)=0x0) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/checkreqprot\x00', 0x2000, 0x0) r7 = creat(&(0x7f00000007c0)='./file0\x00', 0x10) r8 = eventfd2(0x10005, 0x3) io_submit(r4, 0x5, &(0x7f00000009c0)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x9, 0x0, r3, &(0x7f0000000440)="7394251fb9b0581478db89ade6cf2477590975cbcd1bf47e9e6642d385a8403170a8667b14b48683a95d831000fd21b9d54b200b0af5e0732fb44057a8c49ffe04e742b8652b16eb22361982f2910642579190e952b1ce7c054b0e0851065c1a00a9f22c0a645b45dd67bfb39ce872fdfcf033629c14d1e3c93a5be45c4b5c79394541afaad4a609fe", 0x89, 0xff, 0x0, 0x3, r5}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x8, 0x1f, r2, &(0x7f0000000580)="aa28f3c73871214ba3d9d3d15740879f54f45d27a092eae1b0583ea1d242ef5bf8d1d647861b338c6783c570a29fd028485cf4bdef81d3c317d86c1ec939b123c8bb2c6ba2a38452378400c7b8b9361dfed2c801522dddd89a2ec9b924f2a43b518f1cff32074efb05df9e737e8790053aadee30055e4ad6dc74eab1cb40b41bd15d4d56ee4d823a8256d643251adf0b65070740a30a32d5335638622b3c068568f3f62849c085f92f6e697d8ab853c151ea32fb7b7544970072", 0xba, 0x7fff, 0x0, 0x3, r6}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f00000006c0)="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", 0xff, 0x6b, 0x0, 0x3, r7}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x7, 0x100, r2, &(0x7f0000000c80)="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", 0x1000, 0xffffffffffffffff, 0x0, 0x2}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0xf, 0x4, r2, &(0x7f0000000880)="71fee001da42840a165c913aee9c996fcd9b09036ace4a184f8d41ce8963fa3a5cc31b6e84c29486812c13349c1e889ad5c0748a5d063b8341f26e5102911315bb6af5b90996fcc8623fa4adf00e716c5bcb58fa22bd60ac927cde3eedbd9558254ddf3e238f0bca54bf45c7423c0f6c7afa9e26074b11d9e5af1fb0000e94acabe52db1faccb8b59c1ff7af7f67d542fc10d7225a3c430f91def468556a21c60224d15d576f13977674a470debfd2b56001814b43b0f106836bf0f5094a0448d843eb1e701e6a30dfe716a109db77b8dd43c92106950400fc0f7e65a52e10354e4af1fb6c30608192e6673468b9e73055", 0xf1, 0x5, 0x0, 0x2, r8}]) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000340)=',\x00') r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x30002, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r9, 0x29, 0xd3, &(0x7f0000000380)={{0xa, 0x4e23, 0x3, @remote, 0x100}, {0xa, 0x4e22, 0x7, @loopback, 0xffffffffffffffff}, 0x5, [0x6f, 0x3f, 0x80, 0xfffffffffffffffd, 0xffffffff, 0xffffffff, 0x3, 0x28e]}, 0x5c) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2008}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="c7670000", @ANYRES16=r10, @ANYBLOB="000429bd70004100000064703a73797a3200"/29], 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x80) dup3(r1, r3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 618.373006] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 618.385487] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 618.400264] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:03:56 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x8000, 0x40) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="3875d380d67b1f712bc90a55e07d310d0872d2810f968f8f40200dc958a577511678b482e86e6594cde2d05a4000339d5ec370feae013ca51b5cfb0b442fe214e13d24282de852c5d960f0f366bb1b7f043e986dbd2caeac8e51c6a880eaf0b31dd13738a593d1ddf5eedb06cc3f974d159607e5a63ef20402a38d527470c4d33fe558bada7e253a53303c230d22cbd4a239ac57e1473194b577d3f67ba24cab", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2cd3a57c643d00000000", @ANYRESDEC=0x0, @ANYBLOB="02003589831ba8c4602119db7bc011c37d82f8f668ef0794332f75d3f8413c85ceb1e36b"]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000140)={{0x33, @remote, 0x4e22, 0x1, 'rr\x00', 0x2, 0x10, 0x36}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x3, 0x9, 0x6, 0x2}}, 0x44) 04:03:56 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4001000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = dup3(r1, r0, 0x80000) setsockopt$packet_int(r3, 0x107, 0x1f, &(0x7f00000001c0)=0x3, 0x4) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r2, 0x7, 0xffffffffffffff9c, 0xa) read(r1, &(0x7f0000000140)=""/56, 0x38) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) signalfd4(r0, &(0x7f0000000180)={0x3}, 0x8, 0x80000) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) [ 618.431595] EXT4-fs error (device loop5): ext4_iget:4542: inode #2: comm syz-executor.5: root inode unallocated [ 618.445038] EXT4-fs (loop5): get root inode failed [ 618.451950] EXT4-fs (loop5): mount failed 04:03:56 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = dup2(r1, r1) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000580)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r4, 0x400, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x3}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8010) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) getgroups(0x2, &(0x7f0000000480)=[0xee00, 0x0]) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000280)="9ca8084823db81e843fb6a3dedf4d46e73b07014797a7c084d59782e385856454735000cda731afd277161f65bda1ff7395372df7cb44ade33ce53428fb7a87e190d0ea99f6439bcf618308ca05b80608e365f99aa1cce0559adb7c7de96b222f4b685f6e3", 0x65}, {&(0x7f0000000300)="6612d317ad6e99458bb545f0955f617a92fd928bf481f6d0dd428543988df7eb4d3234125ecff2b2dde125a8b4f78cd0f98d8b40d6ecaa91788ba361b9840f51d3b2f4ea1d4381d865cedacacb4cee1cd5ba719353f24402b58a0b6e96130fc5bb490ac7b4609d", 0x67}], 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="00001408000000000000010000fff100000000002b7db10dfef0d9724a3ab30ce320f8ffffffffffffffc317126a2736f0cfdc3c075eac28c01bcdac86aadb83695961e6bfdc7be56a35ed6440ca41046662069ce9c7a43a53cb27eae5112709d3562da17674a3f9797551ff14b1c1393bd40248b34fed1f879dce188f8ab30c06f7b163f5bf7759", @ANYRES32=r0, @ANYBLOB="9b3003668817bf7fdeb7a442e07fdcf560a2a943e5c723df2ff27fd940974e7216c3239b237beff8e2adeca597abfe30da19c828075a2c4c9ebbad785fab3a634c3af9c89a1e929cc9370eae8b0640f56ce41913feaa590091b34912022e2a38577273601281f5670b0224e516eb"], 0x38, 0xf30cae6c8fa48149}, 0x40004) r7 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r7, r7, 0x0, 0x8800000) 04:03:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f00000005c0)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x280, r2, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xb4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa448}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf71}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffc00}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x452}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x35}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3f}]}, @TIPC_NLA_LINK={0xd0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x400}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd906}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x63d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4}]}]}, 0x280}, 0x1, 0x0, 0x0, 0x40000}, 0x4085) write$FUSE_POLL(r0, &(0x7f0000000180)={0x18, 0xffffffffffffffff, 0x7, {0x80000001}}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) pipe(&(0x7f0000000080)) 04:03:56 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000180)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) r3 = dup3(r1, r2, 0x0) r4 = openat(r3, &(0x7f0000000280)='./file0\x00', 0x80000, 0x4) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r6 = getpid() fcntl$lock(r1, 0x25, &(0x7f0000000400)={0x0, 0x1, 0x100, 0x8, r6}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='fuseblk\x00', 0x800000, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="2c726f6f746d6f64753d30307eed3030303030303030303030303030367127303030302c757365725f69643dff6e0f4656ec5a0c2119828d816ca9c5369f6529b3e3c6cedf68d62e", @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r7, @ANYBLOB="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"]) ioctl$FICLONE(r1, 0x40049409, r4) 04:03:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='./file0\x00') fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) [ 618.817002] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 618.829858] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 04:03:56 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4001000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = dup3(r1, r0, 0x80000) setsockopt$packet_int(r3, 0x107, 0x1f, &(0x7f00000001c0)=0x3, 0x4) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r2, 0x7, 0xffffffffffffff9c, 0xa) read(r1, &(0x7f0000000140)=""/56, 0x38) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) signalfd4(r0, &(0x7f0000000180)={0x3}, 0x8, 0x80000) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) [ 618.859392] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:03:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000240)) dup3(r2, r3, 0x0) [ 618.904297] EXT4-fs error (device loop5): ext4_iget:4542: inode #2: comm syz-executor.5: root inode unallocated [ 618.917239] EXT4-fs (loop5): get root inode failed [ 618.923375] EXT4-fs (loop5): mount failed 04:03:56 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r3, r4, &(0x7f0000000000), 0xffff) fcntl$addseals(r4, 0x409, 0x8) fsetxattr$system_posix_acl(r4, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="020000000100000000000000044e04e2d0acd5fd3644219a3e6ff5d10a00000000000010000000000000002000000000000000a9471ff4558c038155baaa2a0d450ec760062c09d95baaddc3c25fc52a0d637f53dc3ade0ac1c52b7d036024e2862923f5d9d49f2fae402448ddfb2d130f2c4c633af25c0700"/131], 0x1, 0x0) dup3(r2, r4, 0x0) 04:03:56 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = dup2(r1, r1) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000580)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r4, 0x400, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x3}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8010) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) getgroups(0x2, &(0x7f0000000480)=[0xee00, 0x0]) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000280)="9ca8084823db81e843fb6a3dedf4d46e73b07014797a7c084d59782e385856454735000cda731afd277161f65bda1ff7395372df7cb44ade33ce53428fb7a87e190d0ea99f6439bcf618308ca05b80608e365f99aa1cce0559adb7c7de96b222f4b685f6e3", 0x65}, {&(0x7f0000000300)="6612d317ad6e99458bb545f0955f617a92fd928bf481f6d0dd428543988df7eb4d3234125ecff2b2dde125a8b4f78cd0f98d8b40d6ecaa91788ba361b9840f51d3b2f4ea1d4381d865cedacacb4cee1cd5ba719353f24402b58a0b6e96130fc5bb490ac7b4609d", 0x67}], 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="00001408000000000000010000fff100000000002b7db10dfef0d9724a3ab30ce320f8ffffffffffffffc317126a2736f0cfdc3c075eac28c01bcdac86aadb83695961e6bfdc7be56a35ed6440ca41046662069ce9c7a43a53cb27eae5112709d3562da17674a3f9797551ff14b1c1393bd40248b34fed1f879dce188f8ab30c06f7b163f5bf7759", @ANYRES32=r0, @ANYBLOB="9b3003668817bf7fdeb7a442e07fdcf560a2a943e5c723df2ff27fd940974e7216c3239b237beff8e2adeca597abfe30da19c828075a2c4c9ebbad785fab3a634c3af9c89a1e929cc9370eae8b0640f56ce41913feaa590091b34912022e2a38577273601281f5670b0224e516eb"], 0x38, 0xf30cae6c8fa48149}, 0x40004) r7 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r7, r7, 0x0, 0x8800000) 04:03:56 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) r2 = dup3(r0, r0, 0x80000) write$P9_RRENAME(r2, &(0x7f0000000140)={0x7, 0x15, 0x1}, 0x7) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) lseek(r0, 0x0, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:56 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) r2 = dup3(r0, r0, 0x80000) write$P9_RRENAME(r2, &(0x7f0000000140)={0x7, 0x15, 0x1}, 0x7) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) lseek(r0, 0x0, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:56 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) r2 = dup3(r0, r0, 0x80000) write$P9_RRENAME(r2, &(0x7f0000000140)={0x7, 0x15, 0x1}, 0x7) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) lseek(r0, 0x0, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) splice(r3, &(0x7f0000000040), r0, &(0x7f0000000180), 0xa44, 0x9) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:03:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0xa269, 0xc000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:03:57 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x2200, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000140)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r2, r3, 0x0) 04:03:57 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f00000003c0)="ea782d16070a51df9bddbc2d5ad1e855854a33a3bd201860384fa227bb09962304a631f35832773293e2139d15f11f7b2b7de3dc8042ceb48e5b2556c54270e0e642a3bd54232cf5e2879a6c9ed81a16be5d9afa8ffc1f1d74ba453204e95dcc553f6f0e3cfc370588e0b5dddec72f665a488d0f45f7848bd95cb85d95b22af768654c7dab431317ede9fdc9d99441193497568f3b40d92371794bd0194f567a7858939c8f8966e28d56704981d253ee30ff2c2a", 0xb4, r1) r3 = getpgrp(0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r3, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) r5 = dup3(r2, r4, 0x80000) ioctl$KDSKBMETA(r5, 0x4b63, &(0x7f0000000140)=0x2) 04:03:57 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = dup2(r1, r1) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000580)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r4, 0x400, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x3}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8010) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) getgroups(0x2, &(0x7f0000000480)=[0xee00, 0x0]) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000280)="9ca8084823db81e843fb6a3dedf4d46e73b07014797a7c084d59782e385856454735000cda731afd277161f65bda1ff7395372df7cb44ade33ce53428fb7a87e190d0ea99f6439bcf618308ca05b80608e365f99aa1cce0559adb7c7de96b222f4b685f6e3", 0x65}, {&(0x7f0000000300)="6612d317ad6e99458bb545f0955f617a92fd928bf481f6d0dd428543988df7eb4d3234125ecff2b2dde125a8b4f78cd0f98d8b40d6ecaa91788ba361b9840f51d3b2f4ea1d4381d865cedacacb4cee1cd5ba719353f24402b58a0b6e96130fc5bb490ac7b4609d", 0x67}], 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="00001408000000000000010000fff100000000002b7db10dfef0d9724a3ab30ce320f8ffffffffffffffc317126a2736f0cfdc3c075eac28c01bcdac86aadb83695961e6bfdc7be56a35ed6440ca41046662069ce9c7a43a53cb27eae5112709d3562da17674a3f9797551ff14b1c1393bd40248b34fed1f879dce188f8ab30c06f7b163f5bf7759", @ANYRES32=r0, @ANYBLOB="9b3003668817bf7fdeb7a442e07fdcf560a2a943e5c723df2ff27fd940974e7216c3239b237beff8e2adeca597abfe30da19c828075a2c4c9ebbad785fab3a634c3af9c89a1e929cc9370eae8b0640f56ce41913feaa590091b34912022e2a38577273601281f5670b0224e516eb"], 0x38, 0xf30cae6c8fa48149}, 0x40004) r7 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r7, r7, 0x0, 0x8800000) [ 619.410002] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 619.428710] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 619.439891] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:03:57 executing program 0: pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) finit_module(r0, &(0x7f0000000180)='ext4\x00', 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000280)) r3 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0xa00, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r5, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0xd, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x35, 0x0, 0x0, 0x0, 0x6, 0xf39, 0x80, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0xd87e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100, 0x0, 0xfff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10e3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x6, 0x2, 0x0, 0xffffffff, 0x0, 0x3, 0x1, 0x40, 0x7fff, 0x0, 0x3, 0xd7b, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) write$uinput_user_dev(r5, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_DEV_SETUP(r5, 0x5501, &(0x7f0000000d00)={{0x7, 0x0, 0x82, 0xffffffff}, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x9e\x1b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\x00', 0xfffffffffffffffe}) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x148) setsockopt$inet6_tcp_buf(r4, 0x6, 0x1f, &(0x7f0000000380), 0xffffffffffffff07) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$sock_inet_SIOCGIFPFLAGS(r7, 0x8935, &(0x7f00000002c0)={'teql0\x00', 0x9}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) mount(&(0x7f00000019c0)=ANY=[@ANYBLOB="eb211b0ef5df1b0a7eadeab0c375a3a40e25becc9ec41649098b4e102990454cc6b61826eeb2a4055c208a803e9c8e8bf7ff0091212e4d9e4c2578825db21649beee91a9d1da4e1aa55dbe47c9412195d3d3f75ad86d7d850004cf75f53ce3f1d70b9d7baa8f2467e8609efe14e3ff387733d1193d4cb8fa1db12f01e67510b690426141f8d92d0d51745903c51537ff0326454758028ff8c07028d9bb6ca78447e7b4ca060000000000000001001f2ef0ca27d5f7004971bcc7bb816deb5f4715b884559273470e037a30f80f4e18cc10507afa3c2ee0172c3972c2d60479de6d360000000800000000000000f269176847a82c372324395b9685a7ec1869a8a2451b8093c9cd0616ddcc4b0879dcdb41d4e9a5de54c08d31caba4697dbfa218447350090889695dafd04b300c8daae47b6b2977d2833af07fe9c0cc5ca8c1890bba91a2037f8b2343c55cae1a9159e9a269b10d1ed149618842ee4b6bcbbe3038ebe54dc9e1c65dfa77777b8492f97bb7f218be63be48f81c7948a2da7acd9ed0b07f7f22389d5fe9fc54cf5a8c71cc05b2340d4cd5c4eeb521d07d9b2846334035d1ee900b2ff5a1abbb16453a040a8e819995b8365127092af0800f8378bd155a6766b69218cd1cf9ea53ef83f950af6207d0647707212713ac7aaa7c3e54e481f063d180522effda526856f8967d2a4f21733e582ed1afcba7daf317e350569b4d484a06a2dc669c08c45376c850d90251df6e4b026f76638b7d38fd87c33f68f3b63fc5ac066ed12290d2aba4b7fe659420f0dc091772ee9407c0bbfa687f17c787c79c8f027ad6532cfca6997840c49ddcf2614a20cc88ef10af5911e6aff2551cfb86899e7e0ee55541e6d823007c7f39251e8e41cae24b2cb33f3dcd0da4d816c8b5051a8"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000001140)=ANY=[@ANYBLOB="a0ec98993d9032ce8e7acd6c70432bf42daeddeb83ae780fc87750254f6c7d202de0587aa0dce6e1ddd2bcc88a17cfa13dc9cb720b591fa9361ed1105a5a7e5cc9034eedd0685791e3fa30b64dcb2b3f16993ac461da4c0af204c04e250dc3081c87c40bfe2462ed951e37a7044a2e21c5924ac44da71259fc5d65cbddb8f5cb44363dd3f03102c1f66db9e65ee34d25fefaf318437cf7bf886a056dff3e93e03761cbe5be58b2ff1e64aa58bcee611b5f2d2de8af4b", @ANYRESHEX=0x0], 0x0, 0x0, 0x4040, 0x0) mount(&(0x7f0000001100)=ANY=[@ANYPTR64], 0x0, 0x0, 0x8000e, 0x0) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f00000001c0)) [ 619.475788] EXT4-fs error (device loop5): ext4_iget:4542: inode #2: comm syz-executor.5: root inode unallocated [ 619.511951] EXT4-fs (loop5): get root inode failed [ 619.522692] EXT4-fs (loop5): mount failed 04:03:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) r4 = geteuid() setuid(r4) dup3(r1, r3, 0x0) 04:03:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) connect$unix(r1, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e22}, 0x6e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r2, r3, 0x0) [ 619.594499] input: syz1 as /devices/virtual/input/input10 04:03:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:57 executing program 0: rmdir(&(0x7f0000000240)='./file1\x00') connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xffffffff, 0xfffffffffffffffe, 0x1c658, 0xe0d2, 0x0, 0x9, 0x4000, 0x9, 0x0, 0x9527, 0x2, 0x6, 0x401, 0x8, 0xfffffffffffffffa, 0x9, 0x0, 0x1, 0x2, 0x4, 0x0, 0x1, 0xfffffffffffffffa, 0xfe000000000000, 0xc0, 0x0, 0x14000000000000, 0x1, 0xf9a, 0x571, 0x1, 0x10001, 0x0, 0x4, 0x4, 0x6fea, 0x0, 0x7, 0x4, @perf_config_ext={0x1f, 0x710}, 0x0, 0x3, 0x0, 0x7, 0x7, 0x5, 0x3f}, r1, 0xc, r0, 0x2) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r3 = getpgrp(0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r3, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r2, 0x0, 0x31e, 0x0, 0x0, 0xfffffe74) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000280)) r5 = socket$inet(0x2, 0x4000020000000001, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000c923d1762afa00817c2da2bfac00000200008000000000000000070000000000000083000000f3ff000000000000000000e26a498abb00"], 0x48) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)) lstat(0x0, 0x0) fcntl$setflags(r4, 0x2, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000540)={'filter\x00', 0x0, 0x0, 0x0, [], 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, 0xf8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:57 executing program 4: rmdir(&(0x7f0000000240)='./file1\x00') connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xffffffff, 0xfffffffffffffffe, 0x1c658, 0xe0d2, 0x0, 0x9, 0x4000, 0x9, 0x0, 0x9527, 0x2, 0x6, 0x401, 0x8, 0xfffffffffffffffa, 0x9, 0x0, 0x1, 0x2, 0x4, 0x0, 0x1, 0xfffffffffffffffa, 0xfe000000000000, 0xc0, 0x0, 0x14000000000000, 0x1, 0xf9a, 0x571, 0x1, 0x10001, 0x0, 0x4, 0x4, 0x6fea, 0x0, 0x7, 0x4, @perf_config_ext={0x1f, 0x710}, 0x0, 0x3, 0x0, 0x7, 0x7, 0x5, 0x3f}, r1, 0xc, r0, 0x2) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r3 = getpgrp(0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r3, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r2, 0x0, 0x31e, 0x0, 0x0, 0xfffffe74) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000280)) r5 = socket$inet(0x2, 0x4000020000000001, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000c923d1762afa00817c2da2bfac00000200008000000000000000070000000000000083000000f3ff000000000000000000e26a498abb00"], 0x48) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)) lstat(0x0, 0x0) fcntl$setflags(r4, 0x2, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000540)={'filter\x00', 0x0, 0x0, 0x0, [], 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, 0xf8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:57 executing program 4: rmdir(&(0x7f0000000240)='./file1\x00') connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xffffffff, 0xfffffffffffffffe, 0x1c658, 0xe0d2, 0x0, 0x9, 0x4000, 0x9, 0x0, 0x9527, 0x2, 0x6, 0x401, 0x8, 0xfffffffffffffffa, 0x9, 0x0, 0x1, 0x2, 0x4, 0x0, 0x1, 0xfffffffffffffffa, 0xfe000000000000, 0xc0, 0x0, 0x14000000000000, 0x1, 0xf9a, 0x571, 0x1, 0x10001, 0x0, 0x4, 0x4, 0x6fea, 0x0, 0x7, 0x4, @perf_config_ext={0x1f, 0x710}, 0x0, 0x3, 0x0, 0x7, 0x7, 0x5, 0x3f}, r1, 0xc, r0, 0x2) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r3 = getpgrp(0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r3, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r2, 0x0, 0x31e, 0x0, 0x0, 0xfffffe74) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000280)) r5 = socket$inet(0x2, 0x4000020000000001, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000c923d1762afa00817c2da2bfac00000200008000000000000000070000000000000083000000f3ff000000000000000000e26a498abb00"], 0x48) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)) lstat(0x0, 0x0) fcntl$setflags(r4, 0x2, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000540)={'filter\x00', 0x0, 0x0, 0x0, [], 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, 0xf8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) [ 619.944284] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 619.978144] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 620.022452] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 620.044629] EXT4-fs error (device loop5): ext4_iget:4542: inode #2: comm syz-executor.5: root inode unallocated [ 620.057879] EXT4-fs (loop5): get root inode failed [ 620.062933] EXT4-fs (loop5): mount failed [ 620.110535] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 620.133106] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 620.143753] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 620.171316] EXT4-fs error (device loop4): ext4_iget:4542: inode #2: comm syz-executor.4: root inode unallocated [ 620.184899] EXT4-fs (loop4): get root inode failed [ 620.190719] EXT4-fs (loop4): mount failed 04:03:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/232, 0xe8}, {&(0x7f0000000080)=""/55, 0x37}, {&(0x7f0000000240)=""/107, 0x6b}], 0x5) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:03:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r0, r0, 0x80000) write$FUSE_INIT(r3, &(0x7f0000000180)={0x50, 0x0, 0x2, {0x7, 0x1f, 0x7b5aff3e00000, 0x84a00, 0x2, 0x3d4, 0x80200000000, 0x4}}, 0x50) r4 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r4, &(0x7f0000000000), 0xffff) fcntl$addseals(r4, 0x409, 0x8) fsetxattr$system_posix_acl(r4, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r4, 0x0) 04:03:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") ioctl(r0, 0x3, &(0x7f0000000240)="5feb20b2dfad429b61b694107cdfd0d4e739a69b7b40166b29bf1dfef0c09e9cbe0b8d6bcba16a1d2e7226834e2026424a2691259deb24757ce504665ca80868b57106345b65271e9a6cce3df478ae0a65bd3e658cd86052843276445ca6421e1a145c4dbea75c15724aee4d356c87151e6f125ade767b8a91ddc7ec2e6afe2bd7722c9fc9eed22adc165373a05e53d99b904dd728ef1d7376fefc28f58ad8c1bbcf4a14f7a85d6ff1eb43ec8419c007e78d226cf37c3fa3228e5db65429f2a99a77a09fa2d84a44b214553d4df4") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r2, 0x0) 04:03:57 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x652383cd238f40d7, 0x10000, 0x0, 0xffffffffffffffa5) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x141001, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000180)) 04:03:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x90002) sendfile(r0, r0, 0x0, 0x8800000) 04:03:58 executing program 4: rmdir(&(0x7f0000000240)='./file1\x00') connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xffffffff, 0xfffffffffffffffe, 0x1c658, 0xe0d2, 0x0, 0x9, 0x4000, 0x9, 0x0, 0x9527, 0x2, 0x6, 0x401, 0x8, 0xfffffffffffffffa, 0x9, 0x0, 0x1, 0x2, 0x4, 0x0, 0x1, 0xfffffffffffffffa, 0xfe000000000000, 0xc0, 0x0, 0x14000000000000, 0x1, 0xf9a, 0x571, 0x1, 0x10001, 0x0, 0x4, 0x4, 0x6fea, 0x0, 0x7, 0x4, @perf_config_ext={0x1f, 0x710}, 0x0, 0x3, 0x0, 0x7, 0x7, 0x5, 0x3f}, r1, 0xc, r0, 0x2) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r3 = getpgrp(0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r3, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r2, 0x0, 0x31e, 0x0, 0x0, 0xfffffe74) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000280)) r5 = socket$inet(0x2, 0x4000020000000001, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000c923d1762afa00817c2da2bfac00000200008000000000000000070000000000000083000000f3ff000000000000000000e26a498abb00"], 0x48) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)) lstat(0x0, 0x0) fcntl$setflags(r4, 0x2, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000540)={'filter\x00', 0x0, 0x0, 0x0, [], 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, 0xf8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x40000, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000240)={0x7, 0x7b, 0x2}, 0x7) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="b3f66a", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = dup3(r1, r1, 0x80000) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{0x0, 0x4, 0x2, 0x3}, 'syz0\x00', 0x5}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000280)={0x30, 0x5, 0x0, {0x40000000, 0x5, 0xfffffffffffffff7}}, 0x30) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xa) 04:03:58 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x652383cd238f40d7, 0x10000, 0x0, 0xffffffffffffffa5) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x141001, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000180)) 04:03:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000003480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x2, &(0x7f00000034c0)=0x5, 0x4) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:03:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x20001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000002c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>\b\x00\xf0t\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00irV\xe9\xf3mO\v\xa6\x9e\x90&?Ef\x01\x16\xb6\x0frrr\xaf5)\x93\x1c\"\xa7X;Z\xe0TO(L\x93CX\xe8\x14\xb9\xa3\xec\xca\xec\xd7\xa6\xd9\x1c\xc0\xa9,\x9e\xaa\xd21\xa7;\xe5w\x114\xd4\xff\xb5Y\xebR\x0fc\t\x15\xecud1\xbf\xcae\x1c\x1e\x13q\xd7\xa0dr\t+\xbaL\x16A\x9de\xd3\xc0r\xd2\xec\x00\xef0e\x91\xb6\x1a\x80\xaez\xa5', 0xfffffffffffffffe) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10f377d92b5691e6d30a285606000000"], 0x1, 0x0) dup3(r1, r2, 0x0) 04:03:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:03:58 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000125bd7000fedbe72501000000080005000000000008000500050000000000000000000000000000000001040004000800020007000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r3, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000280)) alarm(0x100) lstat(0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) ptrace$setopts(0x4200, r3, 0x5, 0x8) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000240)=r4) dup3(r1, r2, 0x0) getsockopt$inet_udp_int(r3, 0x11, 0x6f, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 04:03:58 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000125bd7000fedbe72501000000080005000000000008000500050000000000000000000000000000000001040004000800020007000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r3, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000280)) alarm(0x100) lstat(0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) ptrace$setopts(0x4200, r3, 0x5, 0x8) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) [ 620.699313] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=8963 comm=syz-executor.0 04:03:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x90002) sendfile(r0, r0, 0x0, 0x8800000) [ 620.828838] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=8976 comm=syz-executor.0 [ 620.864526] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 04:03:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000300)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) mlockall(0x2) r5 = dup3(r1, r3, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000040)={0x806, 0x8000, 0x7ff, 0x5, 0x3, 0x6, 0x790728c5, 0x4, 0x63, 0x100000001, 0x5, 0x401}) [ 620.878833] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 620.890886] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:03:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r0, 0x0) [ 620.932086] EXT4-fs error (device loop4): ext4_iget:4542: inode #2: comm syz-executor.4: root inode unallocated [ 620.984862] EXT4-fs (loop4): get root inode failed [ 621.002557] EXT4-fs (loop4): mount failed 04:03:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:03:58 executing program 2: nanosleep(&(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000002c0)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") memfd_create(&(0x7f0000000300)='system.posix_acl_access\x00', 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r0, r2, 0x7fffc) perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0x8001, 0x1, 0x7fff, 0x6, 0x0, 0xfffffffffffffffc, 0x0, 0x4, 0xe3, 0x1, 0x4, 0x2, 0x9, 0x2, 0x4, 0xbf06, 0x4, 0x3, 0x1000, 0x3, 0xd5, 0x372b, 0x1, 0x5, 0x80, 0x73, 0x3, 0x0, 0x800, 0x7ff, 0x8, 0x3, 0x8000, 0x2857, 0x7, 0x3, 0x0, 0x1, 0x6, @perf_bp={&(0x7f0000000040), 0x2}, 0x8, 0x7, 0x1ff, 0x7, 0x2, 0xfffffffffffffffe, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffff9c, 0xb) 04:03:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r0, 0x0, 0x8800000) r1 = dup2(r0, r0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000000)) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000040)={0xe39, 0xffffffff, 0xffff}) 04:03:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) [ 621.357223] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 621.371446] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 621.386739] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:03:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) r1 = dup(r0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x3) 04:03:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000280)='./file0\x00', 0x1, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r2 = getuid() perf_event_open(&(0x7f0000000700)={0x7, 0x70, 0x100, 0x62, 0x7, 0x7, 0x0, 0xff, 0x40200, 0x4, 0x6, 0xd581, 0x8, 0x6, 0x835, 0xff, 0x40, 0x1, 0x6, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x17, 0x8, 0xffffffffffffffff, 0x81, 0x100000001, 0x4, 0x8001, 0x400, 0x9, 0x8, 0xfffffffffffffffb, 0x5, 0x5e, 0x7fffffff, 0x7f, 0x9, 0xb747, 0x0, 0x5, 0x6, @perf_config_ext={0x3423, 0x2}, 0x40, 0x2, 0x1, 0x3, 0x2, 0x2, 0x7}, 0x0, 0xf, r0, 0x2) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x8, &(0x7f0000000640)=[{&(0x7f0000000080)="d460770b55482fdbe5e80eb7c5aa649a2447b9fc", 0x14}, {&(0x7f00000002c0)="e173f4c67281adb08d67ebffeef5389575f4c605245bfb9f9e88db909a6117ad9a13e0ecb795f173578fc71dc0ef9e7ee6b6328ed357a54ed7a04adb10ef075d6c1aef8e957abf03c625", 0x4a, 0x5}, {&(0x7f0000000340)="b2f68960425979d71a91c952adba4a6e2e7edb067c3a8d7542580a4bc1171a370cecc53813d35642fa2a2b4a982dccf4cdeeb0a82c6e01e9f109c11632df64c47bac169fde92799130da943cc0f643e94f3ce1e70019ae8901f92f8aab8d31fb15b21a9e73e8fa558e9306637895dd7133a2820f11098d048f6d187c941cadbcb68c3d7708e216def884b455a99433462ffee3a68a5afc86cfd047cf1574519e6cc96edff6437d9b5cc4554d2d9a194a53796d350a32d07d8a034a137816639756fea5b32a8b38a56341093646f811f97361bf644e4f", 0xd6, 0x4}, {&(0x7f0000000440)="214b706ee239059563e8985c10801ed1b2bc07e9e3939352d55067654939ac6c7a84060cc71fceb20ff746eee89c09529fb3c28f6c2625337a5843832e3ab542d5214c29329fe6cb49b1f81ce918c5b568b78d8fc0c09023ab5dcf25b94cc06a1bf992b798d8ab5316939a8750fe7b43ff259d39a3136b79d8f83a92fcb07f4b27a5630866a47bc1dd1633fc", 0x8c, 0x154}, {&(0x7f00000000c0)="958a771c3e3254c4a4cdf6e9b898956b61e561f35159b4b76b3f03bfebc769cb9b9b8bade91342c081f17e23", 0x2c, 0x100000000}, {&(0x7f0000000140)="79eb8d62c54aa7da083c3107a1efb9c37bd004b935bd17d92d8479b0a6756257668b7d70fb2e3ed2b561286dcabb4d25ffa21edcc4b37bbed3ba", 0x3a, 0x6}, {&(0x7f0000000500)="c09747323dbd2dd415f70e650d6e3ee08beb6606df6a82b14e7db8da0bd2bdeb635f9b82b65bf8fbd339a17b629c5f32edd79241e815a88894908220d318e11e13c89bcdef6f352d16e935d83ea140c039a90764344f6dc01d94173671", 0x5d, 0x101}, {&(0x7f0000000580)="1381452d526a56ddb9457abb23fa87d6d893c20455c5f2af13cb5c4e5d3a9595d4e2e36c20b54e53598b07d0e44deac1ff23c86a3f69e1b916695e9e5cd299eab6a7493e98d0e64be55b1acbea4ba3c83b98de08aa2e141cddc3a77e8177346872032a18f2f423690a34a87638f0f645bd8c22dba5ef9b44475782347d4e122e4a7bb0948bb93479", 0x88, 0x5bf4}], 0x4000, &(0x7f0000000800)=ANY=[@ANYBLOB='nodots,nodots,nodots,nfs=nostale_ro,nodots,nodots,nocase,nodots,dots,euid<', @ANYRESDEC=r2, @ANYBLOB="2c00c03676d8b1e64eb2f7a086642db40700a03b231d8a52e1880a48f9dfd10af2ea54c1e954bc185fde17661b7f98c1d7fd5141577bba213b385053b0e6ec86d9e74752ae36b64cce95daa113e061619ccba1e1840ec2ae4a6544bae738d01d353341051290335be2bf0781c9386a67466f42a4cc854d"]) sendfile(r1, r1, 0x0, 0x8800000) [ 621.401748] EXT4-fs error (device loop4): ext4_iget:4542: inode #2: comm syz-executor.4: root inode unallocated [ 621.413650] EXT4-fs (loop4): get root inode failed [ 621.418995] EXT4-fs (loop4): mount failed 04:03:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) 04:03:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x0, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='hwsim0\x00', 0x10) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r2, 0x0) 04:03:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) [ 621.490064] FAT-fs (loop5): Unrecognized mount option "euid<00000000000000000000" or missing value 04:03:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r0, 0x0, 0x8800000) 04:03:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000500)={0x40, 0x9, [0x83, 0x890, 0x2, 0x100000000, 0x2], 0x10000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f00000002c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000980)=0xe8) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x100000, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x8000}}], [{@func={'func', 0x3d, 'BPRM_CHECK'}}, {@fowner_gt={'fowner>', r3}}, {@seclabel='seclabel'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@dont_hash='dont_hash'}]}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c677b6f75705f694f3dbc683f4100af8b018013b1a3a677b24409585e603cdd3ba51dddaa19317f5998474161e9e3f607a503bf0932", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:03:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030343001010000000000005f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f00000000c0)) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x4) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000180)) 04:03:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685) dup3(r1, r3, 0x0) [ 621.763785] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 04:03:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000040)=ANY=[], 0x0) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000240)=""/182) sendfile(r1, r1, &(0x7f0000000000)=0xffffffffffffffff, 0xffba) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) fcntl$addseals(r1, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="101400a0f1dd52003000000000000000"], 0x1, 0x0) dup3(r1, r2, 0x0) [ 621.804457] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 04:03:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x0) 04:03:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getpgrp(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, 0x0, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r1, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="100001000000006ab8f2829100000000003bb0b6a5ab15"], 0x1, 0x0) dup3(r1, r2, 0x0) [ 621.861664] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 621.952452] EXT4-fs error (device loop4): ext4_iget:4542: inode #2: comm syz-executor.4: root inode unallocated [ 621.976311] EXT4-fs (loop4): get root inode failed [ 621.986996] EXT4-fs (loop4): mount failed 04:03:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$security_ima(r3, &(0x7f0000000280)='security.ima\x00', &(0x7f0000000300)=@v2={0x5, 0x0, 0xe, 0x4, 0x98, "538858f8489759a1f9683973e19c86627ffc6d1bc25e673377645b11f0fea35c6a485ecd45b33bd8ba31a0e59d2d4f36728d90a4ff3b08d35da3ac477444e4b89825a880a2f47a95989cd78e305583c895cb87ffe42d2e053c0dfe18fe2b19e9a70744a7f13e50f55a6e981bed6f5ff584112e5e09e1f2395c48bbde55efb66177111427a008906d81349d423470abd62c3d086fdb622333"}, 0xa2, 0xfdb32de1ab798adb) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) r4 = dup3(r1, r3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000180)=0xc) r6 = getgid() ioctl$FIGETBSZ(r4, 0x2, &(0x7f00000003c0)) write$FUSE_CREATE_OPEN(r4, &(0x7f00000001c0)={0xa0, 0x0, 0x5, {{0x4, 0x1, 0x5c9, 0x40, 0x2, 0x10, {0x3, 0x7, 0x101, 0x8, 0x3, 0x5, 0x8, 0x9, 0x7e79bc9, 0x1, 0x4, r5, r6, 0x6, 0x3b3a}}, {0x0, 0x1b}}}, 0xa0) [ 622.104727] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 622.123465] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 622.137650] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:03:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x20000000000089f0, &(0x7f0000000080)={'sit0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r2, 0x0, 0x8800000) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KDGKBMETA(r3, 0x4b62, &(0x7f00000000c0)) [ 622.167358] EXT4-fs error (device loop5): ext4_iget:4542: inode #2: comm syz-executor.5: root inode unallocated [ 622.186825] EXT4-fs (loop5): get root inode failed [ 622.194462] EXT4-fs (loop5): mount failed 04:03:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="360455249cea736dc1072e1a00000000000000e070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x1) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000400000000"], 0x1, 0x0) dup3(r1, r2, 0x0) 04:03:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getpgrp(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, 0x0, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r1, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:03:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000340)=0xc) r6 = getuid() lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) getgroups(0x4, &(0x7f0000000580)=[0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) getresgid(&(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xa) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x2, r4}, {0x2, 0x6, r5}, {0x2, 0x1, r6}, {0x2, 0x1, r7}, {0x2, 0x7, r8}], {0x4, 0x4}, [{0x8, 0x5, r9}, {0x8, 0x5, r10}, {0x8, 0x2, r11}], {0x10, 0x4}, {0x20, 0x1}}, 0x64, 0x2) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r1, &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f0000000200)=ANY=[], 0x0, 0x1) r12 = dup3(r1, r3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000840)={0x0, r1, 0x4, 0x36, 0x2, 0x2}) perf_event_open(&(0x7f00000007c0)={0x1, 0x70, 0x1, 0x20, 0x100, 0x7, 0x0, 0x8, 0x40000, 0x4, 0x9, 0x10000, 0x5, 0xffffffffffffff99, 0x1, 0x3b4, 0x5, 0x5, 0x8, 0x9, 0xfffffffffffffff8, 0x1ff, 0xf152, 0x7, 0x9, 0x1, 0xfff, 0x3ff, 0x8, 0x401, 0x9, 0x5, 0x1000, 0x5, 0x3, 0x6, 0x0, 0x3fd, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000680), 0x3}, 0x0, 0x9e, 0xffffffff7fffffff, 0x7, 0x2, 0x7, 0x5}, 0x0, 0x5, r12, 0xb) 04:04:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x42000, 0x0) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r2, 0x0) 04:04:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getpgrp(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, 0x0, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r1, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) [ 622.521909] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 622.533841] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 622.543723] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 622.568088] EXT4-fs error (device loop5): ext4_iget:4542: inode #2: comm syz-executor.5: root inode unallocated [ 622.580760] EXT4-fs (loop5): get root inode failed [ 622.586755] EXT4-fs (loop5): mount failed 04:04:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:00 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x20000000000089f0, &(0x7f0000000080)={'sit0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r2, 0x0, 0x8800000) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KDGKBMETA(r3, 0x4b62, &(0x7f00000000c0)) 04:04:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f00000000c0)=0x2) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="06e5774b1d7f79950d507623dc54d5b7d11eff6186e56684aaa4816802c25e7c7b8ead93af0ca4fdaa7f40a64d0269d81d3091b5b114d9aaf3e7b7f1250c76cc12395e0ed9c29f00e4c1a7995d85b6f8babcf48f9fcc68a8b87b5fc92065a4c14f47f1f2c65869fe45438458f375f388ce0660835887fe6d9e0646586f0378fd6c", @ANYPTR, @ANYPTR, @ANYRESHEX=r3, @ANYRESOCT=0x0, @ANYRES64=r1], 0xbc) sendfile(r2, r3, &(0x7f0000000040), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:04:00 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0xb, 0x5, 0x7ff) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10004000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xe0, r3, 0x700, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffd}]}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x40001}, 0x804) r4 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r4, &(0x7f0000000000), 0xffff) fcntl$addseals(r4, 0x409, 0x8) fsetxattr$system_posix_acl(r4, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r4, 0x0) 04:04:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) r4 = gettid() capset(&(0x7f00000001c0)={0x20071028, r4}, &(0x7f0000000200)={0x0, 0x1ff, 0x7, 0x81, 0x200, 0x4}) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCLINUX5(r5, 0x541c, &(0x7f0000000180)={0x5, 0x4, 0x9, 0x41, 0x7f}) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:04:00 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:00 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:00 executing program 4: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = creat(&(0x7f0000000340)='./file0/file0\x00', 0xa0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000380), 0x4) r3 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0xa0, r5, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3f69}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6498}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4010}, 0x40000) ptrace$setregset(0x4205, r4, 0x203, &(0x7f0000000240)={&(0x7f0000000140)}) eventfd2(0x1, 0x80000) sendfile(r1, r3, &(0x7f0000000000), 0xffff) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x81, 0x12, 0x8, 0x8, "7eaaf70bac8b8e3f930900b6c0621df528ec03959326d0be3ac6a68a81a9de9a583104817c30bc1f821746553d8c767b4357bb524102a38dc8f313aa7de03e4a", "876b2c9ac596d4f6e7e77f94c9a6a394609ffe41e8f1fd0056116b0a641aeacc", [0x2bf, 0xfe6a]}) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) [ 623.038964] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 04:04:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000040)={0x31b5, 0x0, 0x2, 0x5, 0x1}) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000280)={0xf, 0x1f, 0x2, 0x7}, 0xf) r4 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RCREATE(r5, &(0x7f0000000200)={0x18, 0x73, 0x1, {{0x10, 0x1, 0x3}, 0x2}}, 0x18) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r4, &(0x7f0000000000), 0xffff) fcntl$addseals(r0, 0x409, 0xfffffffffffffffe) socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$system_posix_acl(r4, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd36443a219a3e6ff5d100000000000000100000000000000220000000000000001f17a523406ec138a63fc145226f92a5771bb06abcfb8994495500dac505d212f6c7c76f679a89ace7c251d6897f70e5544b5011102e"], 0x1, 0x0) dup3(r1, r4, 0x0) 04:04:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1, 0xffffffffffffffff}}, 0x30) 04:04:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x80) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r1, 0x0, 0x8800000) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f00000000c0)) 04:04:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)="275a61635e0bcfec7be070") r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000300)=""/121, &(0x7f0000000380)=0x79) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) fcntl$setlease(r3, 0x400, 0x1) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r3, r4, &(0x7f0000000000), 0xffff) fcntl$addseals(r4, 0x409, 0x8) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) fsetxattr$system_posix_acl(r4, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="0200000001000000000000fd3644219a3e6ff5d10000000000000010000000000000002000000000000033deac8d94011254b749d5a9d1c5c5343e23ecca4c94ee67f541d0eb164d31c93d3b4f4376bdf8227c7211e54140f86b9f632156f0000000000000000000"], 0x1, 0x0) r6 = request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='em1\x00', 0xfffffffffffffffd) ioctl$void(r4, 0x5450) keyctl$update(0x2, r6, 0x0, 0x0) r7 = dup3(r2, r4, 0x0) ioctl$BLKRAGET(r7, 0x1263, &(0x7f0000000040)) 04:04:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40400, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80220000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r4, 0x500, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x40000}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x400c010}, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r2, r3, 0x0) 04:04:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) [ 623.805969] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 623.818482] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 623.828705] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:04:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000040)=ANY=[@ANYRES16=r2], 0x1, 0x3) dup3(r1, r2, 0x0) [ 623.861407] EXT4-fs error (device loop4): ext4_iget:4542: inode #2: comm syz-executor.4: root inode unallocated [ 623.874311] EXT4-fs (loop4): get root inode failed [ 623.880299] EXT4-fs (loop4): mount failed 04:04:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000040)={'ipddp0\x00', 0x1}) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r3, 0x0) 04:04:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)="275a61635e0bcfec7be070") r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000300)=""/121, &(0x7f0000000380)=0x79) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) fcntl$setlease(r3, 0x400, 0x1) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r3, r4, &(0x7f0000000000), 0xffff) fcntl$addseals(r4, 0x409, 0x8) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) fsetxattr$system_posix_acl(r4, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="0200000001000000000000fd3644219a3e6ff5d10000000000000010000000000000002000000000000033deac8d94011254b749d5a9d1c5c5343e23ecca4c94ee67f541d0eb164d31c93d3b4f4376bdf8227c7211e54140f86b9f632156f0000000000000000000"], 0x1, 0x0) r6 = request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='em1\x00', 0xfffffffffffffffd) ioctl$void(r4, 0x5450) keyctl$update(0x2, r6, 0x0, 0x0) r7 = dup3(r2, r4, 0x0) ioctl$BLKRAGET(r7, 0x1263, &(0x7f0000000040)) 04:04:01 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x6, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:01 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x6, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20000000000000}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) lstat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) [ 624.095990] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 624.105844] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 624.116015] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 624.157237] EXT4-fs error (device loop5): ext4_iget:4542: inode #2: comm syz-executor.5: root inode unallocated [ 624.179638] EXT4-fs (loop5): get root inode failed [ 624.190044] EXT4-fs (loop5): mount failed 04:04:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:systemd_passwd_var_run_t:s0\x00', 0x2e, 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x8000, 0x0) openat$cgroup_ro(r2, &(0x7f0000000380)='pids.events\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[], 0x0) sendfile(r1, r3, &(0x7f0000000140)=0x2000, 0x0) fcntl$addseals(r3, 0x409, 0x8) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80200, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x202040}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, r5, 0x0, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xb0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4373}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x4) fsetxattr$system_posix_acl(r3, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r3, 0x0) 04:04:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") symlink(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r0, &(0x7f0000000180)='system.p\x8a\x00)y_acl_atT\xd5\xf3sJ', &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[]], 0x1, 0x2) r4 = dup3(r1, r3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x1, 0x2, 0xff, 0xb, 0x81, 0x1}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) 04:04:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x800, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'veth1_to_bridge\x00', 0x2000}) r2 = socket$inet6(0xa, 0x3, 0x33) r3 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f00000000c0)=r3) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x8001141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r2, r4, 0x0, 0x8482) symlink(0x0, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) 04:04:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9, &(0x7f0000000040)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000802000b3a000000000"], 0x1, 0x0) dup3(r1, r2, 0x0) close(r0) 04:04:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) dup3(r0, r2, 0x0) [ 624.777710] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 624.829822] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 624.840240] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 624.866893] EXT4-fs error (device loop5): ext4_iget:4542: inode #2: comm syz-executor.5: root inode unallocated [ 624.881028] EXT4-fs (loop5): get root inode failed [ 624.891592] EXT4-fs (loop5): mount failed [ 624.901594] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 624.912057] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 624.921841] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:04:02 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r2 = dup(r0) write$P9_ROPEN(r2, &(0x7f0000000000)={0x18, 0x71, 0x1, {{0x21, 0x0, 0x8}, 0x4}}, 0x18) sendfile(r1, r1, 0x0, 0x8800000) [ 624.950707] EXT4-fs error (device loop4): ext4_iget:4542: inode #2: comm syz-executor.4: root inode unallocated [ 624.976940] EXT4-fs (loop4): get root inode failed [ 624.983115] EXT4-fs (loop4): mount failed 04:04:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacp\xd4Vn\xe5m5\x049\xab\xb7@,\f\xff\x9a\xde\x194\xa0|gh\xdb5^\x18\xc6o\xa9k\x00\x00\x00', 0x2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000002000000000000000"], 0x1, 0x0) dup3(r1, r2, 0x0) write$binfmt_elf32(r2, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x9764, 0xffffffffffffffe6, 0x6, 0xff, 0x2, 0x7, 0x400, 0x3a5, 0x38, 0x32e, 0x8001, 0xc3, 0x20, 0x1, 0xe23, 0x1, 0x8}, [{0x60000000, 0x6, 0x81, 0x40, 0xe6de, 0x3, 0x1, 0x6}, {0x0, 0x80, 0x1, 0xec51, 0x7, 0x100, 0x6, 0x1}], "e3a9afdf1a5731a1432ed467fc8a50a14842ae85af484622e410c7df1a04717d8e87f08cbb7de48ceb7877e31646f4c908bd756f242cc0e7f84428c1b781bc546f7d34f9257a1881026c618519bc1cb2bf93641640fbb2de9019152b31d3729dcd952a72595d9adb528e175a0cdfe319655f7c585127bf281d5fed4429d9a5e9f0a54a3545e840c19dac337cd60ba0a96b0c453414d467e7c03c9ef6a31c69d0d3bc92fc750826303f68300d5cb5925d43db469fa6f34248099754676661390f4ee3a40aa083e2c99ffd8a956da807abc3427eb368855d3119693f2f31a1d6098cc80e995d85825be2a3c64ae84cb861", [[], [], [], [], []]}, 0x668) 04:04:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) [ 625.419005] syz-executor.0 (9323) used greatest stack depth: 22680 bytes left 04:04:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000044ed604e2d0acd5fd3644219a3e6ff5d10000000000000010000000000000002000000000000000"], 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000c80)={{0xcc, 0x4, 0x7, 0x1ab, 0x341, 0xe6d, 0xd4, 0x2}, "51c983aa29d94488bcfb585942ac89cde912886f69248b8489142e95ebff347fbf9d2498aa5530bf1b14d1b20f116789ee2b664f80418ffae7b1c2f56088f4c248839bb9326ce86b26c58b292c1066c0fd99efa59626467e362bdd81fb20d8b47207e97f509044bd51bab06a7608b898d09ecd2e799af356072d6ed0c0dd27", [[], [], [], [], [], [], [], [], []]}, 0x99f) dup3(r1, r3, 0x0) 04:04:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3f67721f060000002300000034a7930442643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) r1 = dup2(r0, r0) epoll_wait(r1, &(0x7f0000000480)=[{}, {}, {}, {}], 0x4, 0xab6) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000340)=0xe8) lstat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="020000000002000207000000000000003c0a6b24a0a5cfc5faffffff5249cc4606e03a6933ffd52714f57dac330477b845962c08ce948c857c539e87204886570ce59e2dd61d72c571c91ebacb3ccda34ca6bdf013817f65c8cb", @ANYRES32=r2, @ANYBLOB="040004000000000008000100", @ANYRES32=r3, @ANYBLOB="10000000000000002000040000000000"], 0x34, 0x2) 04:04:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x1) setsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000040), 0x4) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r1, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 04:04:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x800, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'veth1_to_bridge\x00', 0x2000}) r2 = socket$inet6(0xa, 0x3, 0x33) r3 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f00000000c0)=r3) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x8001141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r2, r4, 0x0, 0x8482) symlink(0x0, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) 04:04:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fdb', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) [ 625.679996] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 04:04:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) [ 625.740719] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 625.759838] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:04:03 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1028150}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x128, r2, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x114, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7315}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdb}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd45a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x11f}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x40000}, 0x40855) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r3, r3, 0x0, 0x8800000) 04:04:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) [ 625.797840] EXT4-fs error (device loop5): ext4_iget:4542: inode #2: comm syz-executor.5: root inode unallocated [ 625.824200] EXT4-fs (loop5): get root inode failed [ 625.829701] EXT4-fs (loop5): mount failed 04:04:03 executing program 2: chdir(&(0x7f0000000000)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f0000000380)='./file0\x00') mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="61a7f4fd8a488e4cc3934479afc7efaa21849bae1de2cf539f1b04df236ef822d0fc4d"], &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="ac01a251", @ANYRES16=r1, @ANYBLOB="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"], 0x1ac}, 0x1, 0x0, 0x0, 0x4010}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r2, 0x0, 0x8800000) 04:04:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000100)={0x3}) fstat(r1, &(0x7f0000000340)) getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)=0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:03 executing program 4: chdir(&(0x7f0000000000)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f0000000380)='./file0\x00') mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="61a7f4fd8a488e4cc3934479afc7efaa21849bae1de2cf539f1b04df236ef822d0fc4d"], &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="ac01a251", @ANYRES16=r1, @ANYBLOB="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"], 0x1ac}, 0x1, 0x0, 0x0, 0x4010}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r2, 0x0, 0x8800000) 04:04:03 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r0, 0x0, 0x8800000) truncate(&(0x7f0000000000)='./file0\x00', 0x9) 04:04:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:04:03 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x8040, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f00000005c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@local, @in6=@mcast2, 0x4e20, 0x2000000000000, 0x4e20, 0x5, 0x0, 0x80, 0x20, 0x7f, 0x0, r1}, {0x55, 0x7ff, 0x3, 0x3c1b, 0x7, 0x6, 0x9, 0x2800000000000}, {0x0, 0x3f, 0x7, 0xd36}, 0x2, 0x6e6bb8, 0x3, 0x1, 0x1, 0x3}, {{@in6=@local, 0x4d2, 0xff}, 0x2, @in6=@mcast2, 0x3502, 0x2, 0x1, 0x7, 0x4, 0xffffffff00000000, 0x101}}, 0xe8) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x4712da53c477339c) ioctl$RTC_UIE_OFF(r4, 0x7004) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00022dbd7000fedbdf250100000000000000014100000018001700000003000003ff7564703a73797a3000000000d6a7f6996c61cf1fa13c61361a42ebb8f8704a23dd06bae233e8cbdf48ff5f91f3e268cc28bbd8571e9f31916c7e34cc9e3123b2b19f65bb39e660482cca3a551df97ba6cd39033ba0d8b5348679edf06c26a7765edb47bf03d7e71899e83cdc7e0b6fab70c6"], 0x34}, 0x1, 0x0, 0x0, 0x8001}, 0x40) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) ioctl$RTC_WKALM_RD(r4, 0x80287010, &(0x7f0000000240)) 04:04:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0x2}, 0x28, 0x2) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) r3 = dup2(r2, r0) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote, 0x400006}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() bind$inet6(r3, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev}, 0x1c) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x27) fcntl$setstatus(r1, 0x4, 0x400) 04:04:04 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x1, {0x53, 0x8000, 0x3, {0x0, 0x4}, {0x7f, 0x400}, @const={0xffffffffffffffc1, {0x8, 0x4, 0x4, 0x5f76ff08}}}, {0x57, 0x3ff, 0x1, {0x7bc7, 0x1000}, {0x3c, 0x20}, @const={0xfbb, {0x100000000, 0xfffffffffffffffd, 0x6}}}}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 04:04:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800003) 04:04:04 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000440)={0x3, 0xdd, "c81dcd81228510117eb47b9ec4097b14a46e5b655f8726148a0222018fe99220c87faba4f6be9aa5401fd04392a91affbbd7864f048c5e232aebe91a3bcbc785f8a937e70416c525f0aa440b2519621ff3ab512582328c131106e959d6d8ce94d774920aa830410444731c785ba097760556adab2dd4343daf6a3b7ebc3d4d62045ab731e6acfab7b1cea9fd4c82a7ef0ebdf10858ee66d80f8712c1adca15c4973acd4b8b0a102cd80dd41c83e811deae09c3fb4bfc7aa51d9f983aa95bff02deb3d4e02777d9e0296fcdaf6a83b19b46722304e0fb1da72f63661c7d"}) getgroups(0x5, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee01, 0xee00, 0x0, 0xee01]) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x2000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0xc00}}, {@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize'}}], [{@subj_user={'subj_user'}}]}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c75e965725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c67724b71cf223b1f2a", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000100)={0x25, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x100) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8a) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x0, 0x4, 0x40, 0x9}}, 0x30) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) 04:04:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x10000000000002, 0x6) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000039c0)=[{{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000002c0)=""/253, 0xfd}, {&(0x7f0000003b80)=""/4096, 0x1000}, {&(0x7f0000001480)=""/95, 0x5f}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 626.451700] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.5'. [ 626.466503] input: syz1 as /devices/virtual/input/input11 [ 626.509299] input: syz1 as /devices/virtual/input/input12 04:04:04 executing program 1: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "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"}, 0x10d) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x2000, 0x0) bind(r2, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x3, @rand_addr=0x1}}, 0x80) getsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000480)=""/4096, &(0x7f0000000180)=0x1000) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:04 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000040)='./file0\x00', 0x100, 0x20) read$eventfd(r1, &(0x7f00000000c0), 0x8) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = syz_open_pts(0xffffffffffffffff, 0x470000) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000000)) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) 04:04:04 executing program 2: syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x800) getsockopt$packet_int(r3, 0x107, 0x3, &(0x7f0000000100), &(0x7f0000000200)=0x4) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f00000003c0)='./file0\x00', 0x6ab3ca3f, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="d038b8ec24399aa542a154b3071872d0e8dfd3a0e2dc769f79791606dd70dff62e01f9e3396f3892c0334791b1f515a948cd4822e3fe11d40428bf7a99d7f25db30a66708cb39139b5cc2d5838749260dfb5364310f8f6305a5a70ac11", 0x5d}], 0x20008, &(0x7f0000000580)=ANY=[@ANYBLOB="64656275672c736d61636b66736465663d6e6264002c000959c8901eaa1c01cdf3e0059a1f750561dac632ea2fc45e5e94cbb02426e1dff3d85c4faee95568f6d9b4a1db9d1f91dc949a6e90ccbd9308549c5b963faa08489836139fe2003ac2ad3a1568502923a6807e1c65b3e61fd1acc97521ff973dd3d94dd69f3c5692585a582baee8b76964cefcdd41264950a3220701a1273756640fb380"]) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x400) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x10000000000002, 0x6) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000039c0)=[{{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000002c0)=""/253, 0xfd}, {&(0x7f0000003b80)=""/4096, 0x1000}, {&(0x7f0000001480)=""/95, 0x5f}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 04:04:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800003) 04:04:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) getpgid(r1) sendto$inet(r0, &(0x7f00000000c0)="74380a3c6151cd18560c0d4210377e2560760cab3b6eebfbefbc59b8dfd9935f2f979e1f4c61e7276348de7bb0d892c6f7dd566be67a7c9fb909b17d6f3405afadab59457347046630cffb098988bf", 0x4f, 0x800, &(0x7f0000000200)={0x2, 0x4e20, @rand_addr=0xffff}, 0x10) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) [ 626.868755] SELinux: policydb version -800450555 does not match my version range 15-30 04:04:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x18800000) 04:04:04 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x1d, 0x4, "abe3b856377814419d546b6c76a6a0c11f816e9060baa439ecb7e0e09087dc6c8c92335cdc22de0c1dda26cfe1324a823a7cfb7b071cbb861ef306988cb6692a", "4909b3ee3c34ce25ed7adef266c7eb30d1ff017869df4c8bf69603bbd58fabbe", [0x9]}) rt_sigtimedwait(&(0x7f0000000240)={0x400}, &(0x7f0000000280), &(0x7f0000000340)={0x0, 0x1c9c380}, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="66643d5c9f80f28032c02a0e96bc5c26bf357118d83b1fec0c85ba76ebe4a521c6f28b8156d6e296f15f8179e629154432717b22d332f39c451a2ead064b32", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x280) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0xc000001}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x68, r3, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffffffff7fff}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x80) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f00000000c0)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000001c0)={0xfffffffffffffff8, 0x5, 0xa772, 0x3, 0x3ff, 0x101}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000700)) fcntl$getflags(r1, 0xb) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x3}}, 0x30) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) 04:04:04 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0xc0000, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)={0x9, 0x7fff, 0x0, 0x5, 0x3, [{}, {0xaf28, 0x7, 0x3, 0x0, 0x0, 0x401}, {0x6, 0xb7f, 0x3}]}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) readv(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000680)={0x7, 0x70, 0x4, 0x3, 0x7fff, 0x9, 0x0, 0x0, 0x10000, 0x8, 0x0, 0x3ff, 0x368, 0x7f, 0xc9, 0x0, 0x100000001, 0x1f, 0xe5, 0x5, 0x6, 0x800, 0x0, 0x1, 0x8, 0x3b, 0x6, 0x0, 0x9, 0x0, 0x7fff, 0xfffffffffffffffc, 0x31b0, 0x0, 0x100, 0x7, 0x6, 0x8, 0x0, 0x8f2e, 0x2, @perf_config_ext={0x80, 0x6}, 0x412, 0x10000, 0x1, 0x9, 0x4, 0x10000, 0x9}, r3, 0x1, r0, 0x9) keyctl$describe(0x6, r2, &(0x7f0000000300)=""/251, 0xfb) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) write$binfmt_elf32(r4, 0x0, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x61, 0x0, 0x1bc) getsockopt$sock_int(r1, 0x1, 0x4, 0x0, 0x0) bind$inet(r5, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000001180)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x40100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x8004) sched_setattr(r3, &(0x7f0000000180)={0x30, 0x2, 0x1, 0x10000, 0x6, 0x4244, 0x8}, 0x0) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, 0x0) connect$unix(r1, &(0x7f0000000400)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffeec) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$binfmt_elf64(r5, &(0x7f0000001640)=ANY=[], 0xf5aab446) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000600)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x4, {0x2, 0x4e24, @remote}, 'team_slave_1\x00'}) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="0a0025bd7000fddbdf250c00000040000300080007004e230000080007004e210000080007004e2000000800"], 0x1}}, 0x0) [ 626.919105] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.5'. 04:04:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) get_robust_list(r1, &(0x7f0000000340)=&(0x7f00000002c0)={&(0x7f0000000180)={&(0x7f00000000c0)}, 0x0, &(0x7f0000000280)={&(0x7f0000000240)}}, &(0x7f0000000380)=0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x6}}, 0x30) 04:04:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000004, 0x3) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/checkreqprot\x00', 0x400200, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000440)=0x8, 0x4) r2 = getpgrp(0xffffffffffffffff) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f00000007c0)="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", 0x1000) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x90c6, 0x200000000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x5, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x202}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x4, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x109000, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000240)=0x8, 0x4) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) r5 = dup3(r0, r0, 0x80000) write$P9_RLINK(r5, &(0x7f00000000c0)={0x7, 0x47, 0x2}, 0x7) signalfd4(r0, &(0x7f0000000100)={0xef25}, 0x8, 0x80800) ioctl$RTC_IRQP_SET(r5, 0x4008700c, 0xb7f) 04:04:04 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/192, 0xc0) 04:04:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x200, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='eht4\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000003, 0x0, 0x0, 0x1, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x6) 04:04:04 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) 04:04:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U+', 0xff}, 0x28, 0x3) chroot(&(0x7f0000000000)='./file0\x00') 04:04:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000004, 0x3) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/checkreqprot\x00', 0x400200, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000440)=0x8, 0x4) r2 = getpgrp(0xffffffffffffffff) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f00000007c0)="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", 0x1000) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x90c6, 0x200000000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x5, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x202}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x4, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x109000, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000240)=0x8, 0x4) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) r5 = dup3(r0, r0, 0x80000) write$P9_RLINK(r5, &(0x7f00000000c0)={0x7, 0x47, 0x2}, 0x7) signalfd4(r0, &(0x7f0000000100)={0xef25}, 0x8, 0x80800) ioctl$RTC_IRQP_SET(r5, 0x4008700c, 0xb7f) 04:04:05 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000340)={0x3, 0x3, 0x0, [{0x1, 0x7e8ae28a, 0xf24, 0x80000000, 0xff, 0x9, 0x384}, {0x28000, 0x101, 0x9, 0xe1d2, 0x4, 0x1f, 0x1}, {0x4, 0x5, 0x3, 0xc7f7, 0x80, 0x200, 0x3}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:05 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000000)) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) 04:04:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0xfffffffffffffffe, &(0x7f0000000180)=ANY=[@ANYBLOB="00004961ba0d5a96d1f319dcece8c53729cc96d317b6d6b86806e06852f242c75a46914f85037186fdd51a43b574b212472b8b8380c48ad6479d24cb329771ff501aaa7bf8c86ea2b7c230b9f753a962602d7e418c703df3accea0673e383bfab7190fe0616aa4ea6da650161730de8865c9523367ea1d70731ac076fd08c9ac9809426acefc3e7caa2c4474aeeb8b29c8a39b5af83e9757dd633401e3446bbd91a7f0fcbfd8e47f55a2f0", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x40001101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x0, 0x40100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x4c513977, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) pivot_root(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='./file0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendfile(r0, r0, 0x0, 0x8800000) 04:04:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x2, 0x2) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)=0x20000) prctl$PR_GET_FP_MODE(0x2e) prctl$PR_SET_DUMPABLE(0x4, 0x1) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200, 0x0) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCEXCL(r3, 0x540c) 04:04:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20001001}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x8}) write$FUSE_DIRENT(r0, &(0x7f0000000100)={0x58, 0xd792c93692a27e65, 0x8, [{0x1, 0x2, 0x123, 0x8001}, {0x1, 0x9, 0x12, 0x81c6, 'cpuacct.usage_sys\x00'}]}, 0x58) recvfrom(r0, &(0x7f0000000180)=""/4096, 0x1000, 0x0, &(0x7f0000001180)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x2, 0x1, 0x3, {0xa, 0x4e20, 0x0, @remote, 0x1000}}}, 0x80) 04:04:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22, @local}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x22) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f0000000240)='net/tcp6\x00') write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000000c0)={0x32, 0x6, 0x0, {0x5, 0x2, 0x9, 0x0, '$trusted['}}, 0x32) 04:04:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000004, 0x3) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/checkreqprot\x00', 0x400200, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000440)=0x8, 0x4) r2 = getpgrp(0xffffffffffffffff) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f00000007c0)="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", 0x1000) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x90c6, 0x200000000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x5, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x202}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x4, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x109000, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000240)=0x8, 0x4) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) r5 = dup3(r0, r0, 0x80000) write$P9_RLINK(r5, &(0x7f00000000c0)={0x7, 0x47, 0x2}, 0x7) signalfd4(r0, &(0x7f0000000100)={0xef25}, 0x8, 0x80800) ioctl$RTC_IRQP_SET(r5, 0x4008700c, 0xb7f) 04:04:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)={0x26, 0x3, 0x0, {0x1, 0x5, 0x0, 'fuse\x00'}}, 0x26) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$input_event(r0, &(0x7f0000000100)={{r1, r2/1000+10000}, 0x0, 0x100, 0x6}, 0x18) r3 = open$dir(&(0x7f0000000000)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) 04:04:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40, 0x1) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000000c0)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000200)="7d83a2cdfcda31be655de7aea769e2e65710f75385aeb3d92d961e6560cf1d4bc52de83244a8160e8b19b2ef65ecda6b98d6c4d0a34c27fc107863be16bc80ce712ec0a084e7328f7c7cd6a2c7b88949141b18da95ccf5e8a846a64fe816bb19653f4c98900f04d696d3239c72f9880dffa192e9a6", 0x75}, {&(0x7f0000000100)="ed3c0e5b2bb8fc55a9e425da4006991218b7a2fd163586d104457655972d110eed4ac4a48e5cd98be00d9a4a9c85823657fc069a8f728d0eca5b", 0x3a}, {&(0x7f00000003c0)="11eed75d4ec956db5b251ec51c7a4c5601faeffdaa4b61347786fd36b11cfe59552c3e58bf8d12609448ef12baa44f060b205aceb1ceb53eb5481345316556e4f1f7b504dba6a1866887f41d1468d0e1a15501a3cb0335a1c774abdffac10eafd84036c5df9d67fb690bfafaaaf8cd049d4314a8a37730d1eb585ca25d68e31e3128c667fa6b734853f4ffb692978dd09a7e839854a89cf042d4adbde1d54c8bb78ea6cb38ccb0a5e9915f7ffea2d8b10061add8ab043b72f9cb3862fa8daa46fe2f308647fffd20ffabd43c6cae23134f5a12b55c8618112687ed0189dea404efd189906b", 0xe5}, {&(0x7f00000002c0)="1f3a7dc5e909ca237d08ed1672187d1849cfe3ada7d8e24f5dded435ecef564f2c12426245a5", 0x26}, {&(0x7f00000007c0)="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", 0x1000}], 0x5, &(0x7f0000000540)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3ff}}, @ip_retopts={{0x20, 0x0, 0x7, {[@rr={0x7, 0xb, 0x2, [@broadcast, @rand_addr=0x7a0000000000000]}, @generic={0x97, 0x4, "0082"}]}}}], 0x50}, 0x841) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000018c0)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000040)='./file0\x00', 0x8000, 0x71) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='self#systemsecurityem0ppp0\'\x00', r0}, 0x10) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000240)='self#systemsecurityem0ppp0\'\x00', 0x1c, 0x0) 04:04:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = dup(0xffffffffffffff9c) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:05 executing program 0: r0 = gettid() r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000180), 0x1000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) arch_prctl$ARCH_SET_GS(0x1001, 0x2) fcntl$setsig(r2, 0xa, 0x12) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)=0x3, 0x4) fcntl$setownex(r2, 0xf, &(0x7f0000000040)={0x0, r0}) recvmmsg(r3, &(0x7f0000004e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = dup2(r2, r3) r5 = socket$inet6(0xa, 0x2, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000000c0)='\x00'/11) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000001180)={[], 0x0, 0x4, 0x4, 0x9, 0x0, r0}) tkill(r0, 0x800000000000018) 04:04:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000040)=""/51) 04:04:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x400, 0x0) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f00000000c0)={0x3ff, 0x800, 0x5}) 04:04:06 executing program 4: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=""/185) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x6) 04:04:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000200)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:06 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380)='ip6tnl0\x00', 0x14d) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000100)) perf_event_open(0x0, 0xffffffffffffffff, 0xd, r1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='children\x00') getpeername$unix(r2, &(0x7f0000000180), &(0x7f0000000200)=0x6e) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'syz_tun\x00', 0xf7fffffffffffffd}) 04:04:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) lookup_dcookie(0x10000, &(0x7f0000000200)=""/4096, 0x1000) 04:04:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000004, 0x3) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/checkreqprot\x00', 0x400200, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000440)=0x8, 0x4) r2 = getpgrp(0xffffffffffffffff) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f00000007c0)="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", 0x1000) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x90c6, 0x200000000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x5, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x202}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x4, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x109000, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000240)=0x8, 0x4) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) r5 = dup3(r0, r0, 0x80000) write$P9_RLINK(r5, &(0x7f00000000c0)={0x7, 0x47, 0x2}, 0x7) signalfd4(r0, &(0x7f0000000100)={0xef25}, 0x8, 0x80800) ioctl$RTC_IRQP_SET(r5, 0x4008700c, 0xb7f) 04:04:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x1f}}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:06 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000040)={0x7, 0x79, 0x2}, 0x7) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x40000008800000) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x670, 0x0, 0x248, 0x0, 0x110, 0x0, 0x5a0, 0x5a0, 0x5a0, 0x5a0, 0x5a0, 0x5, 0xfffffffffffffffd, {[{{@ipv6={@empty, @local, [0xffffffff, 0xff, 0xffffff00, 0xff], [0xffffffff, 0xffffffff, 0xff000000, 0xffffffff], 'veth0_to_bond\x00', 'hwsim0\x00', {0xff}, {}, 0x1, 0x9, 0x1}, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x11, @ipv6=@empty, @ipv4=@multicast2, @port=0x4e24, @port=0x4e23}}}, {{@ipv6={@rand_addr="5c6125567cfa7a2927a4fe95d203d54e", @local, [0xffffffff, 0xffffff00, 0xff, 0xffffffff], [0xff, 0x0, 0x0, 0xffffffff], 'dummy0\x00', 'veth1_to_hsr\x00', {}, {}, 0x0, 0xff, 0x1, 0x67}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x1f, 0x3}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x2, @ipv6=@rand_addr="e0195a9165310d1a8391fa3a6c035240", @ipv6=@empty, @port=0x4e20, @gre_key=0x744}}}, {{@uncond, 0x0, 0x200, 0x248, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x9, 0x9, 0x1ff, 0x8, 0x10, 0x1, [@local, @loopback, @local, @dev={0xfe, 0x80, [], 0x1f}, @dev={0xfe, 0x80, [], 0x17}, @rand_addr="d4578dec4200f9e1ea09475ff37f12d3", @ipv4={[], [], @remote}, @loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, @local, @loopback, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, @dev={0xfe, 0x80, [], 0x12}], 0xf}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x1b, @ipv6=@local, @ipv6=@remote, @port=0x4e22, @icmp_id=0x64}}}, {{@uncond, 0x0, 0xc8, 0x110}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@ipv4={[], [], @loopback}, @ipv6=@remote, @gre_key=0x9, @port=0x4e23}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6d0) 04:04:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) lookup_dcookie(0x10000, &(0x7f0000000200)=""/4096, 0x1000) 04:04:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0xffff7ffffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) [ 629.041958] device syz_tun entered promiscuous mode 04:04:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/vga_arbiter\x00', 0x0, 0x0) getpeername$packet(r2, &(0x7f0000001700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001740)=0x14) write$FUSE_GETXATTR(r0, &(0x7f0000001680)={0x18, 0xffffffffffffffff, 0x1, {0x5}}, 0x18) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x100, 0x4, &(0x7f0000001500)=[{&(0x7f0000000340)="c88c699f2402af71eeb7628be7f0814082558ddbc0eb8c8336f057d177ffdfdf3dcfb68897bd359342f0b283bf13542b4ef1d2f76713c638db90049a5a01e7e105bce9187e6f5d95f80ebeb3f1c49ae8caf78f05d790d39362e9e7d3e03a7b09e3d0c317aff614e14ec56d47d77afefb71e9a185e918d2b86aa80a042569be214c535133836dd469526de10de3a3625bbdec333b9bd7c3e72d714b28a85b1b0ffaa17bfa815329ad08295e0a5380cf42e2cde6cd8803c327f9164d657c0d600187ff48867dcd2396fdbd82d691301289de586693b56c8235fd001713be146ae435e26903748cfe7c335aa211e03a0e0316", 0xf1, 0x145ea683}, {&(0x7f0000000240)="15c1f5fa70d2691ba17881eaa5f3aed6afa9852c8fed579c369501ff8c99335a5455923803b30e852e694dedb0b432e341b5f28caedd37f5c1d3b8edad51d014ee64fdc1d19e08e927469c2b012dc36c8477725a", 0x54, 0x7fff}, {&(0x7f0000000440)="3a798db0304144140f6b3df063ba9c37fe43df127791586c18d2a75c1bb4a6883ec22c20bbf9549d62887018c91c51294dd938be07ddb114a83b685fe68c9a3404be049b49b8a933df7110368e061da0bf000cddfdecfeacd716ca02a1d238367e7294781fd8ea76f036ec7cd746d40cc83daa64e640ac8d50f9e2677931cc536399ff5769dcc8e48dac50951c4f7f24fde72863101555448de1b23f219d", 0x9e, 0xcea}, {&(0x7f0000000500)="ca603b40b51d8aa28e0977f57b48dcad2e552d9a7089a0357893f6b1504f2f6fc06a5951dc3043b6e549ec2e67985bc61a3fd64b81d011bbabde963adcc4f97be2f40309ed8e59c47b642083ecffb5e737cbcd58cac005565718e31b69693ae7656458e8d0b90aad00c5607d3170c49aa1ea2c287de6f08c8ecfbadff157ce2822a0696492aef6963bc2814074e647467059ef84df02f8e22de73439a5e9e26efdc1bad7bc7c84a9f3b8afc9353183a1c2e548a10a2268068893e1465806d0cf70eec6c1178320fea3c54a0f771a4ad3177520044e90b17d16cd621322088c00df837c503ce3843a35717da3b9c599b518c9472759047cf16f2590837e1f0ff7c088630668cfa6e6c27d06914afe2b74db98e93e04dc16a0eff38685567dd0dcf6b5d2fbbd06875eb84f2526c3d92e87d6531fc6d3122d43cef80801984cce3d301eb4634afd046c5dbcbfd148e0dae0d468fe12e5748f8ceacf7ae279e6708750526d45d9b466f8042ec78ca196f8283e019beeead046a4e05b1ab610697477a9271895766a96a5be721070d27d05ab6017623d1d805b486750b1e63d36b8e64e5a8135210a0325a69a6cabac00e5a8a2e4e201f3b21bbf228168e00b7a46920c00d5ab5ba659664a67a559d8b172e8a1174be175bd0c5fc0d0e50508ccb8ac5b888ee921a0b9fe574e8b69f0d31c343c47e263dcd71888f83a0cc65c63f9792629ffd62d76a43cf27c038d707dcce70e8b8b05d8a105255957f6256935741baac715c085d8e8dedd9a576cc5030a20d5d81d4c2c8a5aebf8b8a68f038cbebc3326e93c1553362b2bf65c1816ee905b1fe25dd6010761771f6e387b19f0d5a5400fa9b42f6f161d9562c5f62a56949fdd7decddcf7aeade8cfbdf18dcd005b8929853781e2e872ceecd89814e6b308eb7807299668826418355aced34cbf9e8a0632150cb7644d6ad87d49de6f31defb21cb24bf626615b3e89b6d515e7e74b0dfaccb2bbfe5f1c8583fe9951cf14e87c382853924c32e736054697b0a6d995890b7cdd8f6c54482241105aec501229064b0d6deb1a83e7e58b883152d3411af5f61f9fdf61800b41a80441f8df04bb5e6fca0af8967d2ccfd4c35b94404c3dd5d44ca289f99fa9eba3666d40b3088b91cacc63513755ffac3fae79745204eaa352285a2fb1c48f5c755c60549c41d7857b4d42409245a651bb7ada3826e651e483e9c6a5a7ee24f526ff83794464b03d2a4ead90450f06111be71b73fa328a55b078aae457d9a22db122a3f10a58dc0cb15e278b4c715525f6ce22cd1ca860ac6ce3bc976af484fe4326f5cd0fabcd509f7506c45a022fa627694d84567b6d421f618bff5c1f658a0616576c0d0f254da9e8b78302a23f779f3a0f03c547bd0f95ce9fbe28f1f15946751814b65239adec48995debb4bb98d3284e91a436618387802e78ef3f298252373531377ce4fed7f81251fb20a38ca9880fbc3e7111bb341b26b052fdc894752d9b0c0629ee5521b6c25f9559607ad1a96e39f95f64131fb4ee040a35ac4e38a89e4d9186403286b50531473abcc9693cb8c34e16680085527bb8e5ce38225449ea58040df4dc6f88c168abcc477beb4b68b8ed600f7852ebd4857924eca06988ad1f7e1b086372fca5343e42d15bd441252fb0c68c02f5ee747bc1779d4b810ee5115e78c8420942e5c4f9e214f236be40e5a2b4ecddf953a575da7898926b1d94a318f659eb2efd3106ea3bab61691ef22871c6a1bea02207e50a2e910c0121887a3353fe3d822f3428e46a75460633a9e30e9ef29dce3c1410a2c161426c710e42ae94e87d35d37755da4b7db338284c1c19828adecb8ab311b017a6268b42d9ded027ee49e487ad73e33933cddb0cdd41e69cb3fad1fe452eb4dd7ba28a2b96be4c2266b0208da00888f11b38d769fb728fab7c3651259566b1537b64cdaa3497c80974d8cb8f4b1236129e0ce5afdd2ba541e3c8291211bb0754b7ebe1588c1cc178f1da45b63c0bdb79d12c4ee2fdff2368be5a8ccc2c56f8cd9f47b73496c270874c0850372e06c068c859c55c470bf7af5d4b2cd0e88db31dd73af1b937844a53f1162ca6e3eb85e189b47987918fd6a34b0963d9e188df8d695d830c0ffd814ed3531cc7ad53575f5387db23eea52393ff6a213fc69f1d6869b86dfb01b98fdbee9113d5006e13d26889acbaf565bd1bd607dfc1d3d3743fd583ca8f945a2b3fd033c7830eb6b4f08e45619a459e268e3684188446d565d5937a42f32194941f499f426b5c30e26f764fcad9bc3af5ada5ed314f069048b2736d6f0c9b33ef73aa542e6477908654e024eddd677209d9c5a9f3f1409d0ffea6143981bce4559497047eeb72a71468ce88955092857c268c118e33ba464188c809d5ed308e86639b450f91fd7391b59708836ff8e4d8d987d25bcbf013d5f88b1da2b0b44b19eb8ccdd4ed389359fa98c2865a7224e459cb4401012c5d0f7281f23c26a60faade06be05090e1fcbb0e83d9fa93cbfc40d50c84291426ecbf4abd496c0344d1eebd609ad0703c082315aa076ade1a36d7bb9e8e5b84adbe6ab64d3a6415e0d5b1706050510c7bd0e20a13fa1bcb70620cdfd7055ce6818e445fc8f66ea1578f224ccb8b34dac2a40da1b9aadecd72f3287bd18db577cfff244b2e3c0d81b6bcfdd2bdac0a8a4e0dbc565ac95bb29b5b6795276dfe27527a72c7b6c66c7bc3799f823aa31a06523d743cc812017c3a280088e6903c4192685900a59b42b0fdea7e2d6ad9f2f3b42385cc09f73d060bf3a039aec6ba5f7afc70c1a64b3b707c0ed4db15261a7de2725730571cc7fdb5a8dfcb4b5dfe6a840e811e67a1b1276339dd63310fa3d0c07d7e09ed0d53926ca786939938a316006ed6af8a072356bac471116a000709703d6944e7131ddcc2cfd7c3702d99694b6dd596b4c5aad322bf65e91e58ec8a3cfbc7060de5b37d035b1a7206adfe698a64a777e244bb1ba3954f32119380222c07837cdd8b35590380bf18feef87aedc993a9938995aea5660a2119d0eddcc58fd25acd5e9eb53dd986a6e50a9b937c1920b0492f3b291554f486ac19faed9929183672dd06ac65e2c6d07c3b2e7776caf86bbd0e7541ab57c2caa8d1d460f5fc95fbdfd4327166048c4dd007fca5bf83f5acca2fac0f044f32e557c950e2367e04a73008421a2a1099b3f6a444a145ed26cc873ff2886331ee240133a1528dbda8b79a7bcaad97f25929e7c243b5844d8f9fea74be05c8ac2d13ae492488a5f1bc84727c0f6a194385cee3726cf0846cfc62b1f021e529e5178a490bf0122aeeb1761cf2a6ccd21784c1a393e7ba26b3413e639c0502477a13b8652574ed06635732b51dcd87717e47a4bc63aa7b71edb5230c6398e8a3ae23e2fb3cf5fb3a6ffbee4a0936765212e2c409fe8838b7ac3b362e74a0fcc399f08dabea1a63518b39c1efebecf32f3622f1f602e862057d6f14c6d8c71b25570692892f88dba1b6a414056bfb4d70ddde7fe38428515fe74047dfa0ad4edc35e2b82891b0a0859a495a585febd5c4bac8845b36acc50adeab801397cffe51c409bd5d2745a9c51d31f24ea856b52ae33a7c8d04f8ba78134db2104fa6da8c3fd52fd687f17ff8bdaa4f3f5d451ec402afc7ff1aee1c386cfdd7e92533172b0790372144194a18a9e001d37e6ffd3fb6e1cc4029f1985212ff98f137041cff6fedb8d29dd1f3c2fd93e00e38d62bccbfe44c4bf057d4f3f4cd4fd228523934b8905d45bcd4427e488103943d416514a02b5ae4d5d389b218c9673aa4b769a2487173aa97c72c07731d9b1589ac7031744110f88ad1b3099b03b8e53b9da72c832a440b2e040a227eb53ced792e57543149958081aa76a53560389e9b1aa0b47bfef74fd061eee131420ea67d56eb2762dbc7c2c4242cb9a54b938a9489012ab840759e552345ef22141d5d1a4334e0179585f88c9ebb73be88ef01c4ea010cedaee24d6264edb70e0f2d8743c00cde198da537d32cb003ed69747fec6d496df7e7079150fc259a3c142edf2b3f5e27c5ba86db66e65f383e766840c506d32e2edbe300e17b7f55fbca9a13bce59c0f5899d57a16535541519d7e54cc3d9ed8f9d392956f78fdc5b07840cbe2926c7cba8773d0b1ad58af7aaa32f3b6236a4a2c2a7566d4e7fd77648fe559e1708a80260a14079152eddf49b180381a8bf3eb452da6366c77d71660ceb8d5b3c30f267328e6a8b5a976f7d7a1c19f8561d106771345d2757de4e5a023aa41d4126cb3964008f6d809189b1c68718246791a8418f087b2dc2775b7f3663b7f7688b9374da9367786b829c25e37dbf62436688ce6aa1eb58167407218d28d5afc125bdfeb6c916776b3c4d5f855eecd34919c42c1d1b536e774b14b4d48c2d46ac13103367c433d3d16070345bd27c5ae299122318218ae2010ac7c6931c511977a31b768aa69e7f89cf493a3addae9ba9672dce488705c6b954b13eca1dcdc9aeb02a087c1d3ad848bb069c3876266fff9be730df1a9b8e9fcc502907c7db063b363212cf86b9f586d3a1077fc801d5efe6ffa6ddeddb2d88514eb722ac0b90e4558b3cf9278978e416bcbe4b0a0e028ecf8c8b6d16da37cf828be78db36fee1eb767231d2f71aa5fe30fdae075e4ef93db4b5240aeaa0bd04118cb8b87dfa2fb7ab8ec629e912838f3011baab4c771d1db53d6291b4657c90dba7779a2455247b8a99d67c2a9f5ff70c75d3507129749dc6d7dee3bc62c86495f61806fc6b241fb9ff1d8893795b132d5796e1d2565e6cecea43ab1a996182052918621a4209e30aa9b7b67aa44cdc846a04583289fb99871e654bf8cb4ce65302a2d0351ea9c6758b698abf43881c99397c6120c949e359fa888f5223a9a926ed7df1668ea65d21832e94cd109e49340378f8bd42b736e191fc0ff84c1ad7c335da11103c03fa0dc8934359f3052ec66689f17f8df7ad1d51866228e80f8b061c44257c83739469b24f29a11f50d4a7a269abceec214b35a29ca638cc02a376948c94603fbf84bedbc039127bf2abe35a3e39f1988622a3f1bb6c5f558a5aa691df7380003a2c432965483a6a0ff288b349393aaab7f58102ad1b4fa01d43ddac997e92453be1505d17e6d9946be1ffb25e898943e53ea4d1efa53b70a0d1cb21bed26149df17a339937a22a1528b456460f3583f78726ff053d66bfc0b8c4e9c3d92b32f9b5679728bf7b26e7f10bb4b58909e69b04608365d1ec0a6b73a67e7813f358b8b7ae78f76cccc9039b0ad6baaa5b615b8378052054642ee204bc59e343d0a54bde9ee493c65f7f1e90e6a66e3b5fbcad375d7f250049fc5895041b30865cd1978f94ea513590fad74c0f4c9a4a78b7b7c310777a4f9e18b1c15d7381fe75b329f846c629b074690393db3ed910db2bf3d2f7e2bba9debea0107975685fef2ffdedfd672833404ed96f6268b427f53a9ed32f4f9fad3ebb66338b1008e7f381b952d67b3d4a436f49f4d418cb4f7cd8c83f0977567018797997c6db86adc84b8fb90cd6afad8b7be00d1e285cc0b497e67945406cb48e09e322d32bdff85487dbb030b456d7e76caf4180122edaebc28cd622e5755475a7bd31406d45254fbc288694526bff1981cbae592fec8539693f777642b3b91652e133fdac5cec5e8c0f8c2e1380880eb8ecaa4b5caf767c705ed44075394343143d73c110c3718d3a5914801407d104728e12289be14282f16fdd2f4d634667db9569aae72bb0b3631d99eb5360c720980", 0x1000, 0x8dd}], 0x1000000, &(0x7f0000001580)={[{@init_itable='init_itable'}, {@resgid={'resgid', 0x3d, r1}}, {@nodelalloc='nodelalloc'}, {@noacl='noacl'}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0xb}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@dax='dax'}], [{@obj_type={'obj_type', 0x3d, 'wlan1/proc*'}}]}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001640)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0xe) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = syz_genetlink_get_family_id$team(&(0x7f00000017c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000001c00)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001800)={0x390, r5, 0x8, 0x70bd28, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x4}}, {{0x8, 0x1, r3}, {0x104, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r3}, {0xf8, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r3}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r3}, {0x110, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x0, 0x8, 0x937, 0xc1a5}, {0xffffffffffff8000, 0x7f, 0x8}]}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x7, 0xfffffffffffffff8, 0x80000000, 0x5}, {0x7, 0xac, 0xf27d, 0xfffffffffffffff8}, {0x80000001, 0x3, 0x3, 0x5d3}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}]}}]}, 0x390}, 0x1, 0x0, 0x0, 0x1}, 0x40) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) lookup_dcookie(0x10000, &(0x7f0000000200)=""/4096, 0x1000) [ 629.286272] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:04:07 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000800)=0xc) sched_getscheduler(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) r2 = socket$nl_generic(0x10, 0x3, 0x10) listen(r2, 0x9) r3 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x1, 0xa) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000200)={{{@in=@multicast2, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x1f) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000300)=@security={'security\x00', 0xe, 0x4, 0x470, 0x138, 0x0, 0x2b0, 0x2b0, 0x138, 0x3d8, 0x3d8, 0x3d8, 0x3d8, 0x3d8, 0x4, &(0x7f00000000c0), {[{{@ip={@empty, @rand_addr=0x20, 0xffffff00, 0x0, 'bpq0\x00', 'veth0\x00', {}, {0xff}, 0x0, 0x3, 0x1b}, 0x0, 0xd8, 0x138, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x8001, [0x2, 0xde, 0x7, 0x2, 0x79f, 0x1], 0x0, 0x792}}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0x81, 0x9, [0xc, 0x1b, 0x15, 0x8, 0x5, 0xd, 0x2b, 0x22, 0x28, 0x30, 0x3, 0x2d, 0x8, 0x1, 0xc, 0x16], 0x1, 0x3, 0xb5a0}}}, {{@ip={@empty, @broadcast, 0xffffffff, 0x0, 'ip_vti0\x00', 'vlan0\x00', {}, {0xff}, 0x32, 0x1, 0x20}, 0x0, 0x118, 0x178, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x0, 0xb39}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x2, 0x2, 0x1, 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x981e, [0x9, 0x4, 0x4, 0x0, 0x3c3000000000, 0x3f], 0xd20, 0x10000}, {0xffffffffffffb3bb, [0x7ff, 0xffffffffffffff00, 0x100000001, 0x3, 0x401, 0x2], 0x0, 0x8}}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @local, 0x0, 0xffffffff, 'veth0_to_bridge\x00', 'bond_slave_0\x00', {0xff}, {0xff}, 0x16, 0x3, 0x8}, 0x0, 0xb8, 0x128, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x8, 0x6, 0x0, 0x1, 0x0, "b5df84e201ff2b0bd4e9dbd363c2d6c1b938b8e27c76cf897166e977d7c7d789537b0eb996f42354973ae7fe14ac0cca4f566896fa8d8c29304bd2eb00a02411"}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4d0) removexattr(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)=@random={'btrfs.', '\x00'}) 04:04:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000001) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1, 0x2}}, 0x5e) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) 04:04:07 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400) write$selinux_user(r1, &(0x7f0000000080)={'system_u:object_r:dhcpc_var_run_t:s0', 0x20, 'user_u\x00'}, 0x2c) rt_sigprocmask(0x1, &(0x7f00000000c0)={0x100a}, &(0x7f00000001c0), 0xffffffffffffff98) rt_sigprocmask(0x0, &(0x7f0000000000), 0x0, 0x8) 04:04:07 executing program 2: r0 = gettid() syz_open_procfs(r0, &(0x7f00000000c0)='net/anycast6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x1) 04:04:07 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380)='ip6tnl0\x00', 0x14d) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000100)) perf_event_open(0x0, 0xffffffffffffffff, 0xd, r1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='children\x00') getpeername$unix(r2, &(0x7f0000000180), &(0x7f0000000200)=0x6e) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'syz_tun\x00', 0xf7fffffffffffffd}) 04:04:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00D']) clock_settime(0x6, &(0x7f0000000080)) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="33000000060000000000000000000000040000000000060006000000000000000a000000000000002f6465762f667573650000"], 0x33) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_settime(0x5, &(0x7f0000000240)={r1, r2+10000000}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:07 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000400)=0x0) prlimit64(r0, 0xd, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000003c0)=0xa) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a9353a7, 0xa742, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x1c, 0xdc) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x800000400000000) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) 04:04:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101200, 0x0) 04:04:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x404040, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000140)={0x18, 0x0, 0x4, {0x400}}, 0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x0, 0x1}}, 0x30) 04:04:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x200200) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000200)) r2 = getpgrp(0xffffffffffffffff) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000240), 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000100)=0x3, 0x4) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r4, 0x2, 0x1) write$binfmt_elf32(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x1, 0x80, 0x17, 0x1000, 0x3, 0x3e, 0x200, 0x328, 0x38, 0x37d, 0x9, 0xbece, 0x20, 0x1, 0x0, 0x6, 0xfffffffffffffff9}, [{0x6474e557, 0x8, 0x80, 0x9, 0x10001, 0x1, 0xb9b0000000, 0xc306}], "5ee05bd14023995c730aae1b0a6a0bca53db6381d65b5a5756c8145f0f7815ee26f741324c0b350a50723cd425697d393eb61cd53d3b5a4513dcadeda5850e3a4ee50efbaf"}, 0x9d) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0xffffffffffff0ce4) sendfile(r0, r0, 0x0, 0x8800000) 04:04:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x6, 0xca9, 0xfff, 0x8, 0x7f, 0xff}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) dup2(r0, r0) 04:04:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00020f", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:07 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r1, 0x0, 0x3) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/50, 0x32) open$dir(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x2) 04:04:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x84e71b9f8766d0fe) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:08 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380)='ip6tnl0\x00', 0x14d) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000100)) perf_event_open(0x0, 0xffffffffffffffff, 0xd, r1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='children\x00') getpeername$unix(r2, &(0x7f0000000180), &(0x7f0000000200)=0x6e) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'syz_tun\x00', 0xf7fffffffffffffd}) 04:04:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x2, 0x3, 0x5027fc8a, 0x3, 0x29, 0x0, 0x70bd28, 0x25dfdbfb, [@sadb_x_policy={0x8, 0x12, 0x2, 0x0, 0x0, 0x0, 0xffffffffffffffe1, {0x6, 0x32, 0x47, 0x4, 0x0, 0x20, 0x0, @in6=@loopback, @in6=@local}}, @sadb_x_sec_ctx={0x10, 0x18, 0x3, 0x0, 0x75, "d7a2eb08b431dcf994e237d76d0f6af8295d71509750b641af0613165156460d08869e71d909401cfe8041b41efdfcb6ec71a0cdd8c266802f803baf04f060c5ca0a6ac42fc902bd209ec40c791f2620cd7d90c7aa65fd5f6e5d736792bd69ecec84784794d735f752623eb5ac2839edde0644c1e4"}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e21, 0x3, @loopback, 0x6}, @in6={0xa, 0x4e24, 0x0, @local, 0x865c}}, @sadb_sa={0x2, 0x1, 0x4d4, 0x1, 0x7, 0x6e, 0x2, 0x40000000}, @sadb_spirange={0x2, 0x10, 0x4d6, 0x4d2}, @sadb_x_nat_t_type={0x1, 0x14, 0x3}, @sadb_x_sa2={0x2, 0x13, 0x0, 0x0, 0x0, 0x70bd2b, 0x3507}]}, 0x148}}, 0x4) lsetxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000280)={0x0, 0xfb, 0x4d, 0x7, 0x7ff, "7d05fbfac6fae9220009a66006883fd2", "6a96f0253f1afcb5cd0db4e319f2b9a4b0329e7ea8e1f0b85414242bdd99f15105355b9c1286d7c60bf968ba954810ecc4068eb2e3bbf4fa"}, 0x4d, 0x1) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) personality(0xc) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 04:04:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, 'fd'}}]}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) socket$nl_route(0x10, 0x3, 0x0) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x4, 0x2, &(0x7f0000001480)=[{0x0}, {0x0}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) memfd_create(0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) pipe(0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) write(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RCLUNK(r1, &(0x7f0000000080)={0x7, 0x79, 0x2}, 0x7) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x7d6a591eedaef62b}, 0xfffffe36) connect$unix(r2, &(0x7f0000000100)=@abs, 0x6e) 04:04:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030abee3934303030302c757365725f", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) timer_create(0x2, &(0x7f0000000280)={0x0, 0x2d, 0x0, @thr={&(0x7f0000000080)="3f34f9a0b0273c69adb2c5939d317c6d07ced3dda84d36aa60c2623efad404efd8b800b3c4e51b953c87874fc58bd431be07eca4456e6f57ae079c37dd31025a5cf5ecfabcb2867bbef4b9", &(0x7f0000000180)="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"}}, &(0x7f00000002c0)=0x0) timer_gettime(r0, &(0x7f0000000340)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="08f7cbda348f13ee537b6a325893cea7924842eb9cfa2df4090f1fcf06fba86428abc958284fa23e8e322c469ac53f7d4a2cce4c090157f513528a5109470505de4373ff55026328fd351ffd5a97efce31794023442779d9efd8f62174238c189add8dbbe0b25a19e60296145b2f64cad3b3ebd8ab178241ae94bd0e41605e41b9e7b5abdd18302ec7fd2d070d576454e11a687030dd732ff15933184659bcc91813a6c249a11be2d0e9a93609e29e3d78566b33e8ef99e2f746de6c14edca3f39731c5c74504349ee5f1ce4eba5e40b625061d849ac66ec3258e534260ec51e81b6fcd42b853242fc35cea728e4863d8441d94cd0e8e0552e16c1c0b5d46dae3a6316cea20f60620716f2433c87c0d8d4d09be57309fb3a51d72a9ca5cac676ca6fdbf5a2cef5ecd1061fbbf9d8f5b801092dbeec6045af631265957ef6da05e96105fbce674818e21931ea95eae11f", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:08 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0xf20, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x20040854) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x1f2) sendfile(r2, r2, 0x0, 0x8800000) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendfile(r2, r2, 0x0, 0x5d9f173f) 04:04:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 04:04:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) readlinkat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=""/224, 0xe0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:09 executing program 0: socketpair$unix(0x1, 0x400000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create(0x420000000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[{0x1, 0x5, 0x5, 0x5}, {0x6, 0x1018dab0, 0x7fffffff, 0x1}, {0x25f9, 0x1, 0x3, 0x1}, {0x100, 0x9, 0x2, 0xd0}, {0x4, 0x0, 0x7, 0x1f}, {0x8, 0x1, 0x6, 0xffffffffffff8001}]}, 0x10) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x0) 04:04:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f00000000c0)='./file0\x00', 0x4e) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:09 executing program 3: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$set_timeout(0xf, r0, 0x7) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x16, 0x5, 0x70bd29, 0x25dfdbff, {0x19}, [@typed={0x8, 0x48, @u32=0x100000001}]}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x8000) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x2) r3 = dup3(r2, r2, 0x80003) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x42180800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020007410000004d00600000080073797a3000000000000000000000000000000000000000000000000000000000000000008000"/98], 0x68}, 0x1, 0x0, 0x0, 0x4080}, 0x40) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f0000000000)=""/75) sendfile(r2, 0xffffffffffffffff, 0x0, 0x5) 04:04:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0xfffffffffffffe79, 0x5, 0x0, {0x40000000, 0x9}}, 0x30) 04:04:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clock_adjtime(0xffc99a3b, &(0x7f0000000180)) eventfd(0x4) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000080)={{0x2, 0x4e20, @multicast1}, {0x306, @local}, 0x20, {0x2, 0x4e22, @broadcast}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$getown(r0, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x1ec4f7c8, 0x5, 0x1, 0x8001, 0x2, 0x2, 0x3, 0x5, 0x21c, 0x40, 0x3de, 0x40, 0x34f5, 0x38, 0x2, 0x81, 0x2, 0x5}, [{0x6474e553, 0x4, 0x47e, 0x7ff, 0x5, 0x7, 0x1, 0x1f}, {0x60000007, 0x8, 0xffffffffffff7fff, 0xfffffffffffff7fa, 0xff, 0x90c, 0x9d53, 0x7}], "143c22323970339fdf24d7e38a8506534af257b33bcb8a5a0ab044b99e315c59d9bb76355bfb600b992c52ec3085268d89583f1d6115c082b718811992215378eb9da6fd5cefbb8e6856aa380d67d8b81e59545cde9e0efc5182299adff52dbe46dc8f89070f57607e600f78455c0a31e0bddaea90a4c340e3e3032a14a8", [[], [], []]}, 0x42e) lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000f80)=0xe8) ioctl$int_out(r0, 0x5462, &(0x7f0000001400)) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001080)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000001180)=0xe8) getresgid(&(0x7f00000011c0), &(0x7f0000001200)=0x0, &(0x7f0000001240)) sendmmsg$unix(r0, &(0x7f00000013c0)=[{&(0x7f0000000440)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000d00)=[{&(0x7f00000004c0)="42fdc6e14b8decd490f43ef70fd77367ba4c30edf4d66824abeaa99cc6bbcfc6e0f53f86782328a8ea6fb2f6aa7254c68ff29cdab1d2c84e172c97cb04bd844b7824664b6047c627f27e340a92de80aef21504c4bba21effc2dbde83de94b28e7887ae93e53a3b90f4eae8c2df49b81bad1beb22fff2dab84f29bea39f9018b287be07a54233baed6224", 0x8a}, {&(0x7f0000000580)="6d5040869e21e2a36e5d88a772fb285f0ea14dd37a7dae494b77975651baa5b7f323b17a6a7800f06061dcbe5895db02259ab225c0d0c4f2b6a03f6e05ae939808c4f18acff6466ed13872d41a8c53a1c6d84a313fcbf1cabe2f65c02d5e250644549ed2f92eabbb214565ff0f12995c22da2205d65a3edbe1fd246f8d1f61327c56232ae40a0c5d5897a8fcef889124e4550a24e36d08900ef014965b541eba074e5342032f0db9d0781f2473a62b3dbdc8594647cf939eb5240d5894e2872cf69c3ff6819e7c61ab7f0cc92457015a3e952c69dad1495168625ad4e2ec7723d2accfd72a342d6eeeb34b76599536", 0xef}, {&(0x7f0000000680)="416d63becdf97025ee56af6a2ff57bd2dd1eecdf450c60efb1823a041fcc4a9557159411026ed987753d7575260478b6d557fb9d645ec75fb3b9898b2ad957d247885df4fd0744aa5334719460655d304af6df5e02204c905cb5a461a9f3a3a2f04476ff7c6dfc5b91b1f27ba213237ef1cb4ad1ed4443a9cc0bbd8a", 0x7c}, {&(0x7f0000000700)="acab480b07968474409fba5ceeb0a859735c4ca0b6506b9a27dab3f8952eb992fbb732a32a67168e385582e77f2c5465c7380e4ef71514cc4ea96936c15e54694d76a49e9479d9aa2541a607110b6027c0592b513b4fd759567df492ef9abeab80df3dbd63e90a4e7f1001071c67d8cea550799ac8c620ba8d0e447d7eb333f3988dc417b0ac5197979ebb284f3fa8f70e0b33093e", 0x95}, {&(0x7f00000007c0)="be3d1bee7a6eec79c64a0284383f8cd388e12fb74597fe4df8876c1959cca48cd849501cf954bbb7072e5d058e829e9a58549ea24c6a7492738063747ff3efe2fcf97df21534f17e0fb708fd84a135db3af280eb96501744e4298f6659a3eaca840203ad1bdbb0b471516c49f91a39bcda001ec662414104462715c00cf7f6e550fef74f37f0d6420b991d1c65a9060cd996e0628b2d367d84858629e998394f010d6f0f3a21f32daff977d93fc2d443320ed6c75cc7a2a9072070d349509b1f1024", 0xc2}, {&(0x7f00000008c0)="6e2d3a4ac63085901730d57dc60b14f4221715ceabc348c9c042a1f67cff8999404b2dd8c933e6a359d511cf236a989b39ba8247db90f425697dc9b7bc1161538dfc71515453029ddc25c3cf17d1fd75a76488b9bdcca0009aea0be0510687b89fd5947a62623e62ab3507e6ad2c3c941c266886df589133fd7151e6cead33d9eeb2f0d3e0e42242796415d153a8e7210bafc45b2da4e7429001258cbc2d850b63", 0xa1}, {&(0x7f0000000980)="f9bda168c77d713fc27878d32054668ac84c09ad58e2986f948aa9f13b99144ccf8509bd133ca03884708caf9d4e078c02787b1f85f596688f3a410b7fd1d96ec8fc86a5569594e0b3ffebb14d45711f7b4449c784057d103dcc60153d5c4f54502b7769cdc4dbbeca803e684ac7a1979667e7d5fbb158b031bfa042adb512cc004eedafe04f7af779637fb6eda61266e6182bfbb72523ba385a2c", 0x9b}, {&(0x7f0000000a40)="07f8eb79256dfe14a20a5dc4226db4b5bccb7ca68f5275357c41c4a9c1973453e468f77a308a0ae86a1ce15822ee916e7be4f3fd2a048366c2162a2babefc710bff54bf6093e849409efa1f7fd7281e6c0fc06ea2292e13b2353ec4123550d84760e5eb2dc26cf648a06bb73721c0ab094340812176e0c5356bb90de71cd8ed75b95e8cedb8c4bf23bed0e37d61366cd0c94af4305fdadf6389ab57785c0a11c5dbf", 0xa2}, {&(0x7f0000000b00)="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", 0xfc}, {&(0x7f0000000c00)="867e62c3c78c439c98907065778b637d438d1e7aececb66e86342ccf5eaec09e971da70161dc0f5c333a1bc98d7f0f9572964699b07408d7f56a3b6c8e72fc73cf4bab00eb994a42c9557d4719d5b330d1518572711928d19ec99f52990394d9cf8f1c7e100487523aebe61b3ad1502687ddf34d0b95fff115f450e9effa53e128913ae4dcef479a7eb0593c8695eae3d63257dbfbe402ec1b4a99c21622de19ef244047a358499b21e0094c242d5d42d457a8fd4e6d40adbab787b1424214abad1a885e59a8892470ff402cbeb3bcdf5b", 0xd1}], 0xa, &(0x7f0000001280)=[@rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @rights={{0x24, 0x1, 0x1, [r0, r0, r0, r0, r0]}}, @rights={{0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r1, r4, r5}}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r1, r6, r7}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}], 0x120, 0x8080}], 0x1, 0x1) 04:04:09 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0, 0x80800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000003180)=[{{&(0x7f0000000200)=@vsock={0x28, 0x0, 0x2710, @my=0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000280)="8e00978b0920bb7a771c877362144e7ef2df7f882c70ed29221615cd25b3264bce40eb132b81f59de7bf0906f20ed88f76738dfcedd94a666084cbd4c95d7d4b8cae5b43", 0x44}, {&(0x7f0000000400)="5db317470eeb69873653bf2ed8e7b11f48f49ec8c6c3e3cd82e1ed236818bbdb89f4c4862082925e4d69f01de46dda9cd766998528fc9d233b4928819c9957c0bd17425701d9bb5a70c829dfb6f9e697523a53d742319fbb9e68c40d615d94ada05e313569311f99050730e9c7f1152bc45602f6dea06a609f07e882db33dd22e86a7c893702ea29770edbef6fa2ee47bc1543f2b480d35bd41e7f47a70a8bbb97e97550ac8ff835b2e416ebaa192ed8d381c1bb534327a309891ecc7aeb93d956abe5f28c604a5251295b675c6e495c3b202ea4d8", 0xd5}, {&(0x7f0000000300)="73194f2ee020b50fae421e9e84a19bf2dde65dce552015c5b053bbbf11dc272dc03f8c2d9d007a6c36e62481b2c5367998e5033a6f00075d36377355f98a56f14b5054820ab2c06b14d423349e24d375961a2591f578ac29db1808228f5539bdec9aa5f4f41e1b64ef5956cea29359834e4f4ab028565dde21ff535f89870b6bc7a49400ac6f375728c65ec2ce8590c5389c9e371682", 0x96}, {&(0x7f0000000500)="a29f197551b4dbd92d2afeb455d4f478e53aad2ea6f1be703d58964cc4efdcfb7262994a05c4ca7d8a38a1385e5bd88e5febd7252ad8e92a502e1e11aa9320dd5542ae06827a962fc44179b9c3a49f443fa5da22f8ad74d85009bfdc0f1cf138be3936349c52ad263708e9766e780549dae14a896ebf88705f82f1c3ddf60a6034fae107043650a869314e1f75758e2d3bae6c9c09dfb63eb57c8c7d887428a4eea624ed62b97b07997d8f438fbb81d553bfe7b80ed9d5e42bcfddae7a", 0xbd}, {&(0x7f00000005c0)="2aeaf15a514a1e43d70638bc766d4a119a220f149d2ec8335f28a2e1cd6881c574242a97ff11a40ffcaa8d526f2bbb913947614af20f42be86d26de85d8e804cc68f2586b15312a725bf064fd15d2ec48228bf9c07b00144ca4b0f6c8ff2ac5a116b63a9cbca2d0899bef52fa484adf43dca6472065f3593a66aef9b1ff5ae13e2362e08c4e57652ee5d8f7ca5", 0x8d}, {&(0x7f0000000680)="0f8aabe0251c7f9e60ae086aceef69f54736847a8d584d7cc1d2e5f2ba32055bb44771381fc5cabc0127788c64b5351b8dcd95ca5dc994a7efa629fb4e988ef4d685a771003ae934be55dc684d4d4910eff701b0c3ade93f5d82f6771161cad389e0338437b50ba56301d9fe8cecf6a203f798d0b9a54cee3459b0fd648a", 0x7e}, {&(0x7f0000000700)="c86e92f6432705a1a65c58d23c1e9dcd5a33eb3ccbee07bf8cc5a25c3a9f67e9f6d6efce79aa891236198d5acd62f3058f41eca1e45a921309dd20a8c8a25470fb2d495927ea2dccb6b57efbfb3847cda5b815d5c49c9ceabe3f2d87f3e105b0df0ef7024e197c5249e64b8d82a6ac479c53eb7e7126d928a6165ed2771e7471a404b4988a1d12f0257411217515d51d2800fc9501f5acc95f635d3fc2674f30f4642b6c4cc98ad4581fa9", 0xab}], 0x7, &(0x7f0000000840)=[{0xe8, 0x3a, 0xff, "e83d44940764f3c0a346f3e4d50eb8d38e6e75e336858b29eb966aad75380ea00ded9289b5c919fa5d388639491c5f06940299880dc015d0d6e5db43ae4d7748779236d1834d81068f4115ac70251c8ef36feb84268dd073c946ec9136f0c5d1ce616a5a4b39f63dcbf20aa4844b0a4d1784de8d0e0de339a94a814306a179a949dca2b5b2ed484fc576c98562f0b858c19156cd3f61557e94786bc13405732bec450dd369dcba56439ef7fbc48ca00c9609b95529db770e09a75e1626e09c56774914e0f4a9e746fac02fadab968e73ed53c3e503972b"}, {0xd8, 0x18f, 0xc0f, "07ac9646c0f7d8cbf24feb1d78bb949e30f699546349c987c32e8e8a6a4221c097d6327ce8bfe43e7fcd965026cb366db7a61a98e242658a5d2bc2ed856ee166b1456b35ca5c7ea3dd8f77e2d9bf3a44a753abb5470c2e0e1938995d4ed07ef93496a1a1dd6a26d9dcfdacadc39e1818decf24e9055299206b268263c10acdfed0aeb27babe61359131e187159514ce9baeab43267267bc31baee158686e42921beeb4efe544e09f0695407fa5ad4abd01f41264fdde13ed1de210be0296adf44bc2bb7d"}, {0xb0, 0x102, 0x401, "c8f72132a6b7888a2ffc463571a24c00cb4687b330704c3f6df723d93c1a6f3595882a555343b788b6373c90a734e031e085def1d9fdfa87757041a897063db7f39acc4932307e370653e631f0ce58c98ca17f1015a6ad2f151545d43bd207960c3f09fc0ba48fd64211f6ec0ac2cbd0ea0642c32d8908b677abd340980bad6edefbb23b18fe29bfdbe2a0f6c713ce2466b0f31c3589a02bd7efb065"}, {0x110, 0x103, 0x400, "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"}, {0xb0, 0x6, 0x24d085eb, "c1b67abf4acb586a680ceb95497fd7bda64b239e689870c722d37bad473d569de2bc6f87d342dee38a616166129af2a7b9faaa919eb9f17b963be422b8a80aa2a662c40c9826c3468fb01c0c0c21712c0f116e4367c863f08f9fb38e37cf700c5b34c756428045182cb77bfddec5481c93fca6c6ae8628da8e32c2424b282980ee3b18b2cd7ef7536b3c39c5ba7a6d63f1b9c8218ec3898795f4"}, {0xc8, 0x84, 0x3f, "1b6d9929a89daaef2f68df7bcd81eb1b8ad2cd42d31a74165e49794e727bf441a9679a7424651178065c527c623ff15586bf0ceeb140397b65e48b710186f5ee3e8e9312164edb0d42d4c4287a47de48985cbe8cc74b330ed46d5fed2dae693d34daba0dd8ea499b03c7343e518cbcd141b7632c34ddd59c8b430447ae029b4a3bd908d2cf425aa8f9786f9b0c7c4a697338a5f65986c81705b72831592582814e1f0296329dd919d5810038272dc2ceb26804fb"}, {0xd8, 0x111, 0xff, "8ad635aa799fe7d0fd3f2a7bbc4331e7404e23c244d13636981682271dcdcf9340b7b6d5ab4bf2211d21f740c9664a09565e6b8a12fe842c3813b56a031b911e6c255bb64812227d30534aff8d5beed3c73dcc773ed95b3e0a7e6059329db0954df20354e9a76740b0613964ac166ef6897cddea6c77fa3708b0d220691e191df383e7f0ad79af9798736f3a57a48d0993f50e5b1246061abbe5988b7ba538e3d9359822c957b1939c747734f69c8e8fe989c7c6519b3c72ea7a6fd6ec36fb8972852a64c74efe4a"}], 0x5d0}}, {{&(0x7f0000000e40)=@pptp={0x18, 0x2, {0x1, @local}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000ec0)="7f73012e763732a7279dc6db25614d37a7858114880089ef56d38f97a4426f43b6b2e7788e271cd111e64d8b74a0ef8bc60fc185746209879c06847ce7cf3cca8d6cc6fdbd9b26bc49a1b5365c3779ef3143a820e00e4865ce24da6e7eb6ee9983e12d90678dacdab9726b78ac842b933da756", 0x73}], 0x1, &(0x7f0000000f40)=[{0x30, 0x111, 0x3, "7eb1f8a98c80d3741a8b423aaa3c86f6ee3bb0440fe05a773ec710354e7d13"}, {0x1010, 0x1, 0xff, "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"}, {0x1010, 0x10a, 0xfffffffffffff800, "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"}, {0x10, 0x11b, 0x4}, {0xc8, 0x88, 0x8, "2f1ef584b5a2e7fbb9e37396871dcf507c9465949dd490d148f2b4c9e17b0bd22ab33a6cc08b38a60f0e81be775ba92de95008eef896b0068295942b59d18b677a184d5d69c9ef5ad33cf7ee3ffacfb9c8329852c299fcd994f05802fbd5f6b362e8d487ea941bc308c9cef8066d58b441a9000883fdec4e8e3db5e4a2016c5f7b20e856c518aba04c2f3abc53e5a21663f3d128f6f7e53b0e4539bef697ed6663fa719bfb9fc0d5150ebb733a73a5c308a31e40b55f"}, {0x28, 0x1, 0x80000000, "b1c797e69ee1a4b24aa7153c7cd0a378ea89612d"}, {0x58, 0x6, 0xea2, "954efcb90fe155b4ea72b85690dbc21c149a35cd82e92ac73bebd892eadb8d8ee462c1d6d60e82bf08a1f3614aace95876c4cc3f1e6a9043c412f3890c57a957ce1562"}], 0x21a8}}], 0x2, 0x200088c0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x3fffffffffffdc6, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = fcntl$getown(r1, 0x9) r3 = socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xb8, 0x0, 0x0, 0xb2) recvmmsg(r3, &(0x7f0000004800)=[{{&(0x7f0000003200)=@nfc, 0x80, &(0x7f0000000140)=[{&(0x7f0000003280)=""/89, 0x59}, {&(0x7f0000003300)=""/71, 0x47}, {&(0x7f0000003380)=""/196, 0xc4}], 0x3}, 0x6}, {{&(0x7f0000003480)=@sco, 0x80, &(0x7f0000003100)=[{&(0x7f0000003500)=""/4096, 0x1000}, {&(0x7f0000004500)=""/237, 0xed}, {&(0x7f0000004600)=""/106, 0x6a}, {&(0x7f0000004680)=""/76, 0x4c}], 0x4, &(0x7f0000004700)=""/230, 0xe6}, 0x6}], 0x2, 0x40000020, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score_adj\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000180)={[], 0xd053, 0x10000, 0x0, 0x0, 0x0, r2}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0xfffffffffffffffc) sendfile(r5, r5, 0x0, 0x8800000) 04:04:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000000c0)={'erspan0\x00', 0xff}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = memfd_create(&(0x7f0000000040)='}}-\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) write$binfmt_misc(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="73797a31d96d5de2361ec735eaefbbc44b0a03a9e45afc4ef1be01fa8dff6aa640797e93fc6bbbc58165ebea25878b8a8da2d63190b8f323579e28943ebc6e05f442ec8ab4712531e6e3d021fdf638ff2137a52dc71c80e25e20f731587ce34cbe77220c3f5db36901af8b7629eef90f06c3486e96c86a85e9813b2accfae623"], 0x80) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000000)='./file0\x00', 0x111044, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 04:04:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000340)=@get={0x1, &(0x7f00000000c0)=""/39}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="000000000000000000b22c85d0bae2f7a054595c2f0abf4255742a1ecd32f12f5024d22eaeb175bf7b56bcc2f4ea4a1051ccdb435ad50924daf907dffd2385a121d6eb6c9adec79c179a9a2b742baa4388a76fab446f50c0dccb163a65ce63d7e2810f2279d41151157cba1c14547a58f27e673451ce8a773b248b287ecdcd8de5c2df8f10afbfe3c83a6699e1dfd420c0c51bf86afaa0f425426cfbdb1072d135810cd8d816a41a28776e83c378eb58f9595ce2ccc01d7ccdf609fd24e90f"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='iso9660\x00', 0x9, &(0x7f0000000240)='cgroupcgroup+\x00') pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') sendfile(r1, r1, 0x0, 0x8800000) 04:04:09 executing program 2: lsetxattr$security_smack_transmute(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x0, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) rt_sigsuspend(&(0x7f00000000c0)={0x100000000}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 04:04:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7e1}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7fffffff}}], [{@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clock_adjtime(0xffc99a3b, &(0x7f0000000180)) eventfd(0x4) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000080)={{0x2, 0x4e20, @multicast1}, {0x306, @local}, 0x20, {0x2, 0x4e22, @broadcast}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10108808, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clock_adjtime(0xffc99a3b, &(0x7f0000000180)) eventfd(0x4) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000080)={{0x2, 0x4e20, @multicast1}, {0x306, @local}, 0x20, {0x2, 0x4e22, @broadcast}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200200, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000000c0)={0x7, 0x4d, 0x2}, 0x7) 04:04:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x38102, 0x1000000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') getsockname(r1, &(0x7f0000000200)=@can, &(0x7f0000000040)=0x80) sendfile(r0, r0, 0x0, 0x8800000) 04:04:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x400000, 0x198) sendto$unix(r1, &(0x7f0000000240)="8a6d42012004e1d9e454b249c2315f8105e6bb95d22637dc5f94d8f9fcc5520f327282c3138fa46254a6d6b884", 0x2d, 0x1, &(0x7f0000000280)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@tipc=@name={0x1e, 0x2, 0x2, {{0x43, 0x3}, 0x4}}, 0x80) 04:04:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0xe) write$P9_RMKNOD(r1, &(0x7f00000000c0)={0x14, 0x13, 0x2, {0x80, 0x3, 0x1}}, 0x14) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='no>', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x1501fffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:09 executing program 3: lgetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.upper\x00', &(0x7f00000003c0)=""/235, 0xeb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) open$dir(&(0x7f0000000000)='./file0\x00', 0x40000, 0x2) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x10240) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000300)=0x1, 0x4) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) 04:04:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='\x00\b\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffa, 0x0, 0x0, 0x800, 0x0) 04:04:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="feca2f4a7c4116dc71c5d016f4ea515a683193a18eaf603f2b850397bc25ae9bbe6b3df2b1713d53f886f2e563375421c4f1e43e82b134c46ee05edad488c7b5d2da5abd7b57f7", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='net/icmp\x00') sync() getsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000180)=""/183, &(0x7f0000000240)=0xb7) 04:04:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4210}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400280, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='/dev/null\x00', r1}, 0x10) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x70, 0x11, 0xe, 0x400, 0x70bd26, 0x25dfdbfb, {0xf, 0x0, 0x5}, [@generic="393d8ae151b24a2b8a0724103829234eabbeaa06a48e816ad45ce3315131e23dff8bee250c78a7c6bfbef574ddbc69cd963d156f66069b43bfe536513ca9e4581315cf0c0dfdbee33b96570b218a59dc8c030c2b25ea8d4554fb4d"]}, 0x70}, 0x1, 0x0, 0x0, 0x81}, 0x8000) open(&(0x7f0000000300)='./file0\x00', 0x10a00, 0x8) sendfile(r0, r0, 0x0, 0x8800000) 04:04:09 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) prlimit64(r0, 0x1, &(0x7f0000000040)={0x2, 0x7}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 04:04:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_iD=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 04:04:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clock_adjtime(0xffc99a3b, &(0x7f0000000180)) eventfd(0x4) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000080)={{0x2, 0x4e20, @multicast1}, {0x306, @local}, 0x20, {0x2, 0x4e22, @broadcast}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000003c0)=""/136, &(0x7f00000000c0)=0x88) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000000c0)=""/61) creat(&(0x7f0000000000)='./file0\x00', 0x20) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) sendfile(r0, r0, 0x0, 0x8800000) prctl$PR_CAPBSET_READ(0x17, 0x22) 04:04:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0xfff, 0x80000) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x80000000, 0x80) sendfile(r0, r1, &(0x7f0000000280), 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='f=\x00', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000340)={'raw\x00'}, &(0x7f00000003c0)=0x54) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket$nl_xfrm(0x10, 0x3, 0x6) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KDGETLED(r1, 0x4b31, &(0x7f00000000c0)) 04:04:10 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x800, 0x180) sendfile(r1, r0, 0x0, 0x8800005) 04:04:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clock_adjtime(0xffc99a3b, &(0x7f0000000180)) eventfd(0x4) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f00000000c0)='fd', 0x2, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 04:04:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='\x00f,Go', &(0x7f0000000040)={'syz'}, &(0x7f0000000100), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x0, 0xfffffffffffffffd}}, 0x30) 04:04:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clock_adjtime(0xffc99a3b, &(0x7f0000000180)) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:11 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl(r0, 0x3, &(0x7f0000000200)="e4f4e07f37e2e7c775b7862aeffff6382c7ab675bdfed500de5ad6a326b1d1bf568fdcc7ca5c2e5aaffb92e00893c8fc41263403fc8f208696fd5bda4c977e2d17639967a8f168f92aefbea6f1f3e54863f1feaca790ca09cff291c7e5d09f9f242370c069daa0949db38f8c0a4b8332eef5db50b108b11fb0111434f2c679a1a8246e2fd2fb255da47d7c2e938075ca9c8b24d85f010bb18e0fcbfd822c7fbc8366015941") r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x200000, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) write$FUSE_POLL(r2, &(0x7f00000000c0)={0x18, 0x0, 0x5, {0x5}}, 0x18) accept$unix(r2, 0x0, &(0x7f0000000000)) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000140)=0x3, 0x4) sendfile(r1, r1, 0x0, 0x8800000) 04:04:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x516743f0047bd3f7, &(0x7f0000000200)={@local, @broadcast, [{[{0x9100, 0x8, 0x8}], {0x8100, 0x5, 0x7, 0x2}}], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @dev={0xfe, 0x80, [], 0x2b}, @local, @dev={0xfe, 0x80, [], 0x20}}}}}, &(0x7f00000000c0)={0x1, 0x1, [0x346, 0xe36, 0xd54, 0x85f]}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 04:04:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034308b863030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d1a6d1fd2cf1b542b05009ffe5129ad215d7f97799b605cff08509173033ce6bbb7068c3a9f2d3bdca72366455e76235bc8689815ace9c336077a409943fa490a541319fba7", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0xed8dfaa57de159ab, &(0x7f0000000180)=@fragment={0x0, 0x0, 0xfffffffffffffff8, 0x1b, 0x0, 0x8, 0x68}, 0x8) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f00000001c0)={0x4, 0x20, 0x810, 0x80000001, 0x9, 0x2}) 04:04:11 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) read$eventfd(r0, &(0x7f00000000c0), 0x8) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:11 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x80000) inotify_add_watch(r1, &(0x7f0000000200)='./file0\x00', 0x41000c40) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x20) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f00000000c0)) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x10000) 04:04:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000002c0)) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) setsockopt$inet_int(r1, 0x0, 0x31, &(0x7f00000000c0)=0x7, 0x4) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) r4 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x8000, 0x1) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000200)={0x33, 0x9, 0xf, 0x10, 0xa, 0x6c29, 0x1, 0xc5}) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x4001, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0)=@ccm_128={{0x304}, "6a25ffcc64328e85", "57e753aae5108e3e5d9fcd588aca576d", '6\f@d', "d94df1bbd882b36d"}, 0x28) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r3, 0x5413, &(0x7f0000000000)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:12 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000240)=""/130, 0x82, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x1, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) select(0x40, &(0x7f0000000040)={0x3, 0x3f, 0x100000000, 0x0, 0x10000, 0x7, 0x6, 0x9}, &(0x7f0000000080)={0x4, 0xa2, 0xffffffffffffff81, 0x4, 0x8, 0x80000001, 0x82e, 0x5}, &(0x7f00000000c0)={0xd63, 0x7, 0x25, 0xffffffffffffff74, 0x2, 0x6, 0x5, 0x9}, &(0x7f0000000200)={r2, r3/1000+10000}) sendfile(r1, r0, 0x0, 0x10000) 04:04:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='fd') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="a2d8ac76d0c417dadd251e61128685c2c2611a1b997b3593bc431d13b9222d55a7a85ff586d2a66f864729e577099b105cc7fdf6502c692fe982878f369ffeed093e777cd5120dd75c", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:audisp_exec_t:s0\x00', 0x23, 0x1) sendfile(r0, r0, 0x0, 0x8800000) 04:04:12 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x8000, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000003c0)={0x100000000, {{0x2, 0x4e22, @empty}}}, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="20000000100d01681faf86dd201aa3722745d433ae004d8396270041f7620020258339b28386e64a29cdc2b22a82000000b901a3e66dbee2bb390556a30049be55826d79bcbc70ea4a51dc1fa964e87d01e465b01bc0227654a9d490f8029ff7bff42294ad40f51b3abfb9f419fee648be859a00ba1b33cb88047a812f56bb9b71dc91fd86a74797240ea84497fb11e4130a98d89030bb5ec1da7d2a7db9de625f01a1eaa1a10441d2cf3ac88ae77128b98b23797e4958d0b2579ebf04e9b5286fa06ba585b7eedff696a590fffe6d8b80060618ce5c7ad6bb570ed3b703b2bd609d107f6e0257db09bdcb0fcd98a5308239abb33cb71e46f01f5e8a58dffea38519e11e8e80f66120647a7c89c471e53da5a93ce90a062efa4e7f4a8c00000000"], 0x1}}, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xf) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@add_del={0x2, &(0x7f0000000100)='bridge0\x00'}) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x38) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000480)=""/245) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ptrace$cont(0x9, r3, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r5, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r2 = syz_open_procfs$namespace(r1, &(0x7f0000000180)='ns/net\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030000000000000000030302c75736572d569643dae303f4f9650843b", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x2000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r3, 0x0, 0xcb, 0x1000, &(0x7f0000000340)="45078407aa006c976968aad0a8222d56e2c589a26093e022671e8ad79c164255ca773a8591f22a1ab00cd7cce0b46be59cb5c135e8b252a6eeb936e1dd8e812ef550b8d85f952b32c6f2f6719ee36063f0072bde3e4fc7d8eafaecda35fa8d2fd4716fb91c69b50a783b1bc02b496616bc4c6f2d09ee29ae0d7faf10daf297148207aeb2cc2c7d332f4aab1a333ae8029ea783e208797499d7520ece305bbb58c3429cca7f65399fccc4039cf31afcd6d9c2f18a91e8f79612e72c06a54bf4acd03120c4fbb5c353cc2775", &(0x7f0000000440)=""/4096}, 0x28) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000001c0)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x14c) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f00000002c0)=0x3) 04:04:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='p\xc2c\xff\x01\x00\x00\xff\x00\x00\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000004c0)='\b', 0xfffffffffffffffe) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6621, 0x1) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x20) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000240)=0x1c, 0x0) accept(r1, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000300)=0x80) sendfile(r0, r0, 0x0, 0x8800000) r2 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c) getpeername$inet6(r2, &(0x7f00000000c0), &(0x7f0000000140)=0x1c) 04:04:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @empty}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) fcntl$setown(r0, 0x8, r1) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:12 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) socketpair(0x1f, 0x80000, 0x972, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001b80)={{{@in=@initdev, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001c80)=0xff) r5 = getegid() sendmmsg$unix(r3, &(0x7f0000001d00)=[{&(0x7f00000002c0)=@file={0x1, '.\x00'}, 0x6e, &(0x7f0000001940)=[{&(0x7f00000003c0)="c5f2fb3ff37f8ba94a3c1394ab23076c2be5664fe0ef88ce62ec8566bc64dac5805766e631dffe1a2017522eb61ac55913bda1990f6571bd66095c73a1989914f9788a034d5762e57ee2925dbb7e497b47c82470fb1f18f3a3e664167d297a966bf83feefc25542ed35321ae04a15c21612f2ab1f4212a91ff9dd47a290f5d0c88042c6f803879660cdeb721f0531c92f8fe9cc64b299b2e44f98e75ebdfb1fd157c62043d63a91effb8f065a1f4da4f44b56ed7c2d81aedfb8b0db31dbe5d91d4", 0xc1}, {&(0x7f00000004c0)="8af72d120eaa71577cd8a948554fd1d868db98d89bad9483be068428c33230fe63a8ba084216e4726aaa803819daa9af9fa52258edf1af56794f203b171ed4cd59f5068c9d3fbc81f491040f7d69f67485f26cf8e2ef41f04c09f448f08920c24f30bc37145ad233db322ae7bbafa4ed3a07635a18550e931e42eb2698f17a1c8199c3c7501b20286e1c6d6cb1ae132a90531c8617f400356ec689ca67191e4f88e4445fcfcdb9bdea14af847d069c81cb63c9", 0xb3}, {&(0x7f0000000240)="ac6b375d6fc575f5e26535575dcaf1afc04caab128c8385d500baaa3acb5e138b08466e65a6e4d4116244e67191d588a35af3765cf86a3ff6235", 0x3a}, {&(0x7f0000000580)="9e76ce73907575b8568ad42a7a5824837ea0e83a01649ba30619370a107aeef66fcc24a914c453d04fb117ed84ad29494091a1fba208791998b8f1e120cfeafb2ead41b7a5c980ffb85b655e6b131ba81aade8e9073f427ad000012b15773688b116a217680cd79f375cd7ccffd68119c805873acc84f247bb2119785a1dbc0b0aeb606a863ccb", 0x87}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f0000000640)="119986b334cbbc97c0f3ed2db7b8f01acf2ec65e7c5adf3193f624a5db2675d289855bfdc5b2602593870bfc880a5b504753ef713880afb4576766c5c5d6c23a2743991fba085500a13bcee94f24ac0a508bd5cc8a70ebf6520cca1bd96ef571aca96cd4a053c3931701776395bd4bc1546cc3bac3a2bcb9c4193ece", 0x7c}, {&(0x7f00000017c0)="ba2f3e29190454f0ca00a02200d98a74a4d8a18795d241132d8ac3f6f0c989193a2616ce0add86c20bdf683de93f095457f813f51eae59841f4f403f7e0a330e09471075d467aba53a4c02da2c8a8020b40f8fc604f1aaa079dff663bc997cd7df54dad752e193cff098abb6f0d4c6ae1b8ec38272f5e9f5b9e84586d26404d7d3a3329c1d0250dc94ceb25b5adb741adc8565dba87d9acd6bf1e16da6", 0x9d}, {&(0x7f0000001880)="13a43e973986e505731fd988a5b4ae40c1ed9a469591e730ed360c2c823bf0ed1e69de9d8cda9175e5afb653b01b31d403fbb84e9b921d9d33da9f8afa76c650a8ee5652d3d7a8b93beb1605250b6c32d3deb348548be11cc48a8f4aea399da373ada97aa6abd3bb1ed2915ea5e65b20d4e2177912f541925752892393de64de07b823622ecb883c743f7b32028b29", 0x8f}], 0x8, &(0x7f00000019c0)=[@rights={{0x28, 0x1, 0x1, [r0, r0, r1, r1, r1, r1]}}], 0x28, 0x4000015}, {&(0x7f0000001a00)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001b40)=[{&(0x7f0000001a80)="6499a846f8d0665a4564354deb9a0a9740ee0e7619cf998c0501d168c2737e348d6735a8b61c3091a2595bcf9a82daac01334a67da69f3860728af5826496c0dc2283d58e6ad77936317b50e30b2fcfa9de02f09140b2639038e8d54267535bc7d004915c4c8cb12157e45fccfec025ae29b4599ade69c826b83664eb55e26c7cd42b367e01fd7b4b5ce2db7da4c3210bbe04b", 0x93}], 0x1, &(0x7f0000001cc0)=[@cred={{0x1c, 0x1, 0x2, {r2, r4, r5}}}], 0x20, 0x4000}], 0x2, 0xe133fa6fe8e1671c) r6 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r6, 0x2, 0x1) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e23, @empty}, {0x6, @broadcast}, 0x20, {0x2, 0x4e24, @multicast2}, 'rose0\x00'}) r7 = openat(0xffffffffffffff9c, &(0x7f0000001d80)='./file1\x00', 0x40000, 0x2) ioctl$KDSIGACCEPT(r7, 0x4b4e, 0x1d) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x84018000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x30, r3, 0x200, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000080}, 0x8000) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r4, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 04:04:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x50, 0x0, 0x841) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:13 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="a49bc9697e9340a0a2ca2c723d30303030303030303030303030303030303034303030302c757365725f69643d00000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x210000, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080), 0x9f) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x81, 0x12) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 04:04:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x4, [@int={0x10, 0x0, 0x0, 0x1, 0x0, 0x11, 0x0, 0x67, 0x4}, @restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @func={0xe, 0x0, 0x0, 0xc, 0x5}, @volatile={0x7, 0x0, 0x0, 0x9, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x80000000, 0x100000001}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3, 0x2}}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000340)=""/102, 0x80, 0x66}, 0x20) write$binfmt_script(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="2321202e2f66696c6530202f6465762f7a65726f002025202a3a6367726f75702d2896707070316c6f270aa5a8797c3bf3322df3b06abdf8ad73479286616961be6094de16b335c38b24634f289978cc55a57922d198409bec2aced9ecd1d866c977b3ad56f642403e0c8b506e9a0d7981476f3de294ef3c731ce9e87c956ffa5a4668f1e5c063617abee8a5dc12bfb9e5079cd64802ca847a4629033da15d47d755dc6fbffe5b8350335855b8bbde9de22cc610e200"/195], 0xbd) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) vmsplice(r1, &(0x7f0000000180)=[{&(0x7f0000000480)="d9fa71b59155ad50a4707a03eeadab907d0e1509e0642d4c18a1d1881dc78d2e403adbf13512be9914acbffd944aaa3c653f60cc4a451720f4e7a0681c3fb8c22f140343e8dcf24709b77c3e0ad38c35333c8bc4e5e21ada70", 0x59}, {&(0x7f0000000500)="8ce79df3d2e46089157d0aa6b7582c6e3fc0dbe2ebdef9d4d43389d82ff1a0dfab9ab78ef1b49bcc8570db142e4779f0063adeb02cd94e724d9ef17de30bbf8ee39101f70bcf850c", 0x48}], 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000004004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) get_robust_list(r1, &(0x7f0000000300)=&(0x7f00000002c0)={&(0x7f00000004c0)={&(0x7f0000000480)}, 0x0, &(0x7f0000000500)}, &(0x7f00000003c0)=0x18) r3 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x2000) accept4$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000240)=0x1c, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000000c0)="437a84", 0x3) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:13 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 04:04:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@fsmagic={'fsmagic', 0x3d, 0x9}}]}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:13 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) pread64(r0, &(0x7f0000000080)=""/51, 0x33, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r0, r0, 0x0, 0x8800000) 04:04:13 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x100) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) unlinkat(r2, &(0x7f00000000c0)='./file0\x00', 0x200) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="66643d9a12c3420000000077cd477b5a60830958307925e5f9396146681f0bf871894be69b819f", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4000000000001}}, 0x30) 04:04:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0xfea7, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:13 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000003c80)={@initdev, 0x0}, &(0x7f0000003cc0)=0x14) accept4(0xffffffffffffff9c, &(0x7f0000005780)=@can={0x1d, 0x0}, &(0x7f0000005800)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000005900)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000005a00)=0xe8) sendmmsg$inet(r1, &(0x7f0000005b40)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000000)="4da89bd296c8fcd2cff6284f082be50f832eaf1e7d9fb92b7ed958", 0x1b}, {&(0x7f0000000200)="8e13fef1ea29ef492e5748b0e891537ebde6a33c63a44450d15288c552518472d16b236d8d5ef126f6bf19d147aef981caf98e2918dd2530bac2b8fb13b086b60cdb79a1a165a6553727f58fafee52396f67cfa5f6fb0a37b9bc5fe78b233ce6739dd2a2a4829b70f487776dba1e28901ea69846cbc09d1e276e6cbb14c860802c9eeb1d80c1cdb25b2cde238f9987e4400606274f942527e65fdec21835", 0x9e}, {&(0x7f00000002c0)="7bd71b24dfd754670a9c3b490439ecd38e31c11f3801b3f043735c9cde5a9aeaab8f8c7f4e4656c31f8dc6808ebf673d30188cca84ee46fda336a244621e074c7cd4497b9ca4547de19df44b57b20829d35b", 0x52}, {&(0x7f0000000340)="7dcfd4ffcbe32314589bbeb731b9fe1d7ae37afd5b8aeda874392a5b511db4622100e3c945ca3ce0ab9a8f3d8d1cefcabe4536df2e8022d1b301d4aba8a1b60e9c661cd1c3d616514ca0720d2e32c01335076af483fd8b147151ce67c861f50ff7e41d3971424043dc63224ef237b02b1baf22d28be2cfa4ae3388dad22720d12d755317c2e298973d6aa8c827b6f16931088cbd6f1a1da36e3559ddc3bc31b68774630a39702dc3f903ebfeeb524c0410b29884850695688d5fa863e8892c64bad48059faaf57b43ed70717e1ef23a2c495cfee461216d6d94a7e8f81ae8bdffd70556a8993d0df3d5fdec230327ec2191b3023785493d9ec7cdcf9e0c29c0e016917a21b0e3156d15a77909142fde436a916f3f11edd6a6d657f2deb6979e5d0e7aacb23ff4c9bbccff46de7446a18338cf008f848631799a221092eea8b4afd5cf23f5e4ea23a58a51d225344734dd69939ecc7ec261e7c31b0f63bde513db2ee33e8cedb16dbb3ff65cc59b28be458263c66ea5ad393c29949c68b55dbf57bec01ab97dd335316809eab47608611f724346ce80a909118086337f24093179aebcb45b982cba4597b11d37f6421d70bbe9c5999e95f7ffc686abba3e24e563bca6ef76c1029d14f00fd7b058c0cc7d4af5cf8c7b5cd7f455d7d9f5dacafc1c0ec033caa5bdb775605e869ad026f5891599c348d182d57c37e66e5e97fc7a3e9007b0fe5918906d13ff7b31405a274626973b4de64136a42a4e9a951b07afe9827ec8a508efc370457100eb96bb8bf3c93063792a48e0b02faff0df9b1c9585f302f27ab3daa811fe61ff653a987309f7b3e8f34aaa5554382787841fa20f01caa9905d0eb007eb93be9e2af39fbcb202deb8e72bb848b14de5ab6ea0e15ade43cef8230263a7e2e51d6d6e27b209a3bb2cc2f2cbaaee655eb2b474cfe6e237814f5f842ff5bdd328b15926ab253c91f04df4e4245973cf628e3d934757319bc28f80e9bd92d3be31fb75df2540e69065e9cf9da3bb4d705d7dbd0a3265e393c27c61fdb5f4c0be9ed26a5554f16e0ca4da97357c8ff49acb0e3ab26deb8f6ccf563d6a4badc265baf7c52383683d756828401157afa17667aa2df3d41695c49e3c26d643519524249bbca9875533f936715339d6764d68283e792bc454bb53091fe8fcb6383cc6be1bd2f3f7874e2748f53a87b3f1697fefbdfffb8f0b88899b61d599e660076b0bb1309bb3edf579a339e8a23ad556de33968d54c291fcbb3caf90f8ebe56415a094b42fb55274939d544e8ca933ed321505b05c16ec51df72df12b7ecff4078c730d7f8cc04b44bdb200bde5681dd80fe3815070bbef05b852ecae2a58204a3c5bf43c8cc059cc40f88ee2686e6defd52de543b3ce498a55070a34d70d8fcb58a48322302a37555e7194af296cf165144d2418e5e967b0cb959263f5226c59c5be83630f48b6c4b5694efdc0033ad88fc56b2034868dbfa1c57af1123e4c491864f5a86c4a083e0ba5dc892331b55eafc0e919774836132b97a4c08e78debbdb6aed94952c9ddd0ecdc68ca8f8ba474ad1c6a7ae061b5de2f09e39390545e7d6f6aff4045a641bf10c6bfbbeb1d1431b9a6465ba363d777e87bdee1920e559c5f447224004e85b5fb9028cb31dca593c5a1645f4c4ad867968fcf02574155dba4046afaf489e659835bc26d52424388904eb4f79acb167ef56b7d0a8e5e7d713f9c5318a6b871033a4e15f69afe334299712df4aa26d3e08307abf09a3ed9c41ab03c8bed368843c223736ee85f4e5b783eccf219e4db069536ad6ae854924f029df8ecb38b287b5abe4d4a88c5f6381a897b8d8836172ecae77e9d7ed3f1ef847235d7442ef931d3ebe542cc7165221f33499ceca834566d2c4b7e9703d9e4cd5653f698e280061d50afb888ec28b6bbf1513734d236ad272a36b47841f15f7c624fede32de72e067f1b4b4341cac6279d6ed366eb7adffb47acf30d704138dd764fdda0d75d1de94ba5a567df667ddad8604678cba19ed5e49cdef37e9353bfa8a56bd68a72216cd10782f3b0c14599a3fff9f67d1371bb58e5b8dd59bd5f39c0ea68e58044b9a8de1da7dfd53cb117cce115aa9373adb2cb3701ec0f03e3e74d90e3471eba6144d19445348760eed9cb1c53684f15fb22e4db505e38c8058c50278906ce30b626a114f3fcc5d5907727a504abb3e6bdaa1590f2dc8d79bbe75e52478324fa26b7b91df5844dc144bde8ad72cbecc459b27729562bc936ef6a41665c30620e2b7fb81ee23dbd551ec70ee4a28d13ff496f338ff1ef4e78849ee22255b2912d9d3216f646f825dafdb62e658846bf180375a5904f2017e3511572242373eadc353db3e9e00e536b3d476f1dc451121a168835449d33539d2d1ca421b310469c8e6b3eaf1c6aa7f330601a2395dd8c58a13b5074a7e7523e30a098e44590482c34487b14d0d5e19b66f5801c9dccbcf83d2587bfafb625719bf599e0f15430597f4ddb8678de8192d9954b9cdd2e2f8640f113e3eb969a5314e334b600ed5e98a956f5423da2a1b168543157c2541d4d261193ab93526a37153cca405bbd1cb710fbc01c3be11fd0132d05530c6e67058d2e53b9a8345e11dc04fa649aa94430967d25e611b56a24af2e274370311b78a3521d130736dffc67acbffb982db58f49f7bc7e18c7d576831e1a7fba8bd9cfe874b0b4651aea056f7ffc05b9b74ff0fbef6ae86cb09539f2845f0f10dbb8314951792280e3e84828939b55a6b6e118276737eddd795c0a491e6deb569546f3b3b8a1e3176e6c077fa2b00806b3c4ba6f20469bb7e9b21855de0f6c4b311b18277bf56e2251172a68ed456dcd6529dae188cb3d278f1c934c7465d059bd05df2f53daba89f771e542823ab76357a040e321f896d7ac67effcb8e32eac7df0d053f23cae2f975ff0eb294eaa3d5298c6e5f43f4b8b789f2b5ed21ddfeaff30ca69dc22d2083af4f3b750cdf89a1b18c84a6eb2a8fe3f954ceba7115ddcd9cf4f537b5886444a8d7fa10f45b04a3e61c19f4477111fcd1c70639f51b4974c1463396f98af4a9641916de16051f2df85f087a182b638b2ec3ec3482d6ec1968b99a37318c10425e7849443eaab4f72e9d3a0f1705b603e48f70f37783de2baa62a875af739cd2bf1d0a93b40c39df7b2e435daaee8db3d3969cd9e18385ec5dbc82004b095cbcfcd032dd7f232d0360d4055db65d57c75bc5461c7fb09cedf8f305316cd68607b1c39bff09628f0a049943a6e02f72521eab2456ca5c094ffb0417c3396a08e29ea988085ad38cee4aa2518cf170d741122c6e67b45dc76ea4ad5fc7db3def1a0fa2b10e8c31f342b48a0084562aba089ddde9902fdab16b9a169c96e42ae3f8882ba30205d123b2b72689648bd9628e60be5d3e2570804677b97d332e00a6389f431ad3ddfad71b403256ef97bc4905a7654ce73346cb059d5032edb6b3aea96c4b833bdbcb81815c71216d9592a767e4a96a2cb876aec5aeb8d35ce147792303aa0a3cf23006ba849e02243d90ff1a2a274eeb3aafb4f67c7ab58e68f03f3c54298d9b993d1ff9ec6d7b78afd1d465109cf878ce7031e987746a1df0de6b954cde4e80d2d91b0aff7b6a78b04aae1cc7565582ddbfcbe47a40d4cdc511a5581296a54f564ac8459aa1f61c2cf5e8a304240769fe1f869da0cc1a10e3d396e8b3b8ba42bd9133190b53c5ec7badb6e1e4446af76c92cdc39fa7803e2ffec93226f1050c3ca60f2b70a848bb2052a5aa7688f63134f09903c0bc66ad2e6ed2d88e6e71f128c845aad3e618c128e6b82f2a55303bb1dcaaca28e7d0191cb740f855e3db58c6bde87d9222f71e184596a8fd3b06f551b9991d7652a8d7f5f9d6503fdfb95e87bd1a95e1c8ad1acdf2444aea0ae3ff583ca5c701b735fcae313a6433400665f15adcac5684f5ceb9cc7c6dff405d0f72865687b286a4ac04bf1333de59e0372382686086c2838222a6e24f24bdd1c503b005c66da8f11aeb4d1c6d3ad2e9098e179f4712bd9e7ebb52c578eeaf6f87d3db3726011da1412589b2e5743701878d2c22e672a62ad06e3a9bf1adfad539f3597e2c0d118532c202b467a480437359fb9dd25ce34d606da251e8dd4b48cf6945f60b30886c822528354354ff905005c1dfe4a61249571e05afe504fdd6264eef37ea5732aef4ff1801c7d2dc63bd6da41e5e55296b2643d7c0ddd63e740b32782882932eb9dc48fc3e1fd3a13d0bc7746b5043ffb634b05888360e9c1ddfcf0704914e5ffcdb1b742be48d04ddc0fa3058e5fa57a7ccb9f837e2ca7f283aabbd607afd8972ab826876e8b9837c39daf307b3f9d4f43a3eac27f8dc488699aed14717195a1e64ca9ccae6fa2efac4f6096a8a6470cc2eabeb67469489be24b9420e1cc2c74b076ffb8f19a27c4a09c4f3d423937d965112faeec2816dafd0f7bf15a95bdcc31aafd9cfe7d0fb7aa7130f647ea7788a357c701e7cbef902213325df171331b0127213fa637e829b9f1a328a91ac26a498770ecc39675b698f6f8b5f80b0c0222c2ab4ee639ebf4093b78209433e1d1e29a2b5f9e60b3cd3cf4f3b68be06d6679b250d09e7cfdb4bb0b142a4992bdcead92eeda6b4a7c9d372fc60782c0da9ade5a2833117a5808d45a815b2d778672024c2d3a35539be408e9ca4fb81cdca70c484f9f18dc5a6d7eef7943af39df4a78af118107423bf78cdf274117d05a2abea3315fc67d796a70d57c86728e0c674ec570ee7b5f0dd2e53019bd16b429a6c7b60e5509a869befaf7e96ef64a0b79605d3eb688f5a008bbd901b7a87aa38299b10262dcd1c61a5d25260209c6bdf5ee6c09229f4a5a1c17e5719d5d1269992768298dd594fa7039138d36df1d4b1b06c65388be912ee0a6f7a51588cae4e68ca2129f3407069e2f7bb9172d126da919166c6a69c5d73f934ed36ae1755c34fe02b561d9d664fb02dcaec0ec5a15436d53d76f5e63217aab5f5a74dd421975e10016331fab43819d833dc441e3e5701cbeb516936147ba6dc35e0000a09265b1f3cc49a76319c7cae33bb0350aa38f1b49c44d6c7cb3ab10a662016cd2256d0f0862f38e31561cb3f425ec5557dbcd65c43bc4c0b04f47576155b5ab587dca28f6082f275bacd9e28835981cbc3e966267398c71b1aaed59a6ddf11eced1363186d4ad42212d63966b197ce745b9e726847381e0915a2fb53a49a7839f68a4328828b7823239f65b788c2a33a42f3c73d62eade72e30dcbbcd346ef2fb920b81f67f4512e655df7ce624f74ec0944a07bc410eb74ae2039dab6d13bcdadeaf5416a36ae7698d81a0c4351b4568fe0f9cb514ad3db976970e352a90421f75166a9e838da7369ceb6c4e78038fafbc630d61ece9d99551ec78963935cf5df61832c80d9b407f5550f5e5e3e243e272750fdd535aaa6b2056bcbea9c79092611d416c1a62ba6a217ea634d0bb942a90c30ffde2ce4dfade8d3c8a0bb8ad2ff2aa179e074d3f28b923a1e8bc832d21da800656304d82b33fb5c3bcd7eda4e9634aeea1f64258dc1f29dcc2fa7d2afe0959d54317dbef8e28ba42bdac215d4160788a67e449ff6a0bcb0521b0bc258ff6a769b366940680052f26652592ee5d4ae6e2823b284650dd2bd4a52c3aa90e74f268c0bcf84ac2ef11b87eaddd71e2533e0b1a1f2de07d653f28c3bd66da7ac0cd0b5d3932b5317595772261823dbef22567c632fa422839afaa8b7bf9bd9d3a7bdcce17422ed62743d3116400ce7496490", 0x1000}, {&(0x7f0000000040)="0f0e023815831bd56483d071f2eaf22676", 0x11}, {&(0x7f0000001340)="89fc940d567a0276087b54f2d311f5623236b8f8621b5d5de7118db68d5ebd4dcce00a9bdfdad9081d31630f279818c6c007a4e5d9c82900f68ccb49aae76e316e6ffe8cd23bf978c73c29fe7a0ac7b0aa8ff6d1ce848787e84a2ff62cf0c773fc04ec4575f406b18524836961d459adcbe78a9f189290ed64cb62ca4fa4eb1533c5ad75c14a34a2fad71d29dffb369f7b76c0d425f1cf3bd4e1c0ebce9e14e26d2a2964af98a34a6893d6e0f296836757cc1fb85133bd979c28e9c0fbf3aad1a69726b3106431f03553414cb64ff37d11df34c95365ceb760b86642a187304f56ceeea6ee54f98bc725c133a2884a", 0xef}, {&(0x7f0000001440)="818a2d162ce9df5563ec86bd2e3c13cc5456a3126dc5b35c21a09c0eeb94fccc4e4964e55afb4159c628ce6a7a654685dfbd19596dc406d049672af62d7412b4604395dba009de3b0000a87db6df50249a01dab92aad2c76658050a03c7d8fcdae23caf96349769c72d4a42d10327b942b70dbf5965b9ea9f05b9cce08b2d6490fa5871e0136b0635167490ebc2d766ba2147217bd3166444035bcda362534bf", 0xa0}, {&(0x7f0000001500)="def235075ddbf65412f692da48f49b22bb257d25f446e5798f90b1af9cd1fb138f2e409e991195d8d4222793318f358d683a463e1a6c89b79bb05a23c2a3e80c10cfa88b6cbd82b4", 0x48}, {&(0x7f0000001580)="e4643862af27133ce0836beaa8af5aed99a9919936d5a41f18d2f445dfd07965e12d7d58a952490c9a814741f45c1021c84ea3c2fe4f1e3d7b86f04df4b468430622e571245408b077a5896a4b5104750dfe447b96ec002b90e7446c548c6b6ba628f46d2adf3f315bdf4d0f0eaab5cc626bf9fe84aa2b1c981f9cdc93cb90c67a24da049dcc6f6bc4cb8f45e69a8f4268348c8d8c39527e6c2b607db95a1bd493e0e5ee8061271e671372780061d57d341a517cdd9b17b3be328eeb1d2a0ca495324b601b4157ba72315c56011bc2a022d11ac320a9420ec855eb72d641028db59be247f019", 0xe6}], 0x9, &(0x7f0000001740)=[@ip_retopts={{0x4c, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0xfffffffffffffff7}, @cipso={0x86, 0x37, 0x1, [{0x7, 0x12, "3340b2ca7fa9959c7deb571c5ca5385e"}, {0x0, 0x6, "6f3989bc"}, {0x7, 0x12, "b3e6dc6238d03101e6cf8b66eae63484"}, {0x5, 0x7, "b8ee01b327"}]}, @end]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr=0x1, @remote}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_tos_int={{0x14}}, @ip_retopts={{0x34, 0x0, 0x7, {[@cipso={0x86, 0x6, 0x3}, @ra={0x94, 0x6, 0xffffffffffffff0d}, @cipso={0x86, 0x8, 0x7, [{0x0, 0x2}]}, @generic={0x7, 0xf, "de79b9bf39ea7f5f8c92c86d3e"}, @noop]}}}, @ip_retopts={{0x54, 0x0, 0x7, {[@generic={0x88, 0x6, "ffd6c748"}, @timestamp={0x44, 0xc, 0x9, 0x0, 0xffffffff, [{}, {[], 0x5}]}, @cipso={0x86, 0x1f, 0x9, [{0x7, 0x7, "de8c5aa89c"}, {0x1, 0x7, "8acd57e405"}, {0x7, 0xb, "f5b9b704e0b8b9b087"}]}, @end, @ra={0x94, 0x6, 0x4}, @ssrr={0x89, 0x7, 0x2, [@empty]}, @noop, @noop, @noop]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x319d}}], 0x160}}, {{&(0x7f00000018c0)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f00000039c0)=[{&(0x7f0000001900)="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", 0x1000}, {&(0x7f0000002900)="f7edbe3f1e8b9e7f59d2df12216cfd9bdd2e92d717207d144f8a196612fc92c258aff1461a1b", 0x26}, {&(0x7f0000002940)="5a08bd95a85021146398fa1c4f472f921f0945", 0x13}, {&(0x7f0000002980)="415bd2d9d5270690e09037c2c0fc", 0xe}, {&(0x7f00000029c0)="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", 0x1000}], 0x5, &(0x7f0000003a40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x10000}}, @ip_tos_u8={{0x11}}], 0x30}}, {{0x0, 0x0, &(0x7f0000003b80)=[{&(0x7f0000003a80)="416e2e8fce4c4505d88ddebf1bca752fd28fc00a140d353634aa7482a6ad3b1652818767f3e846a190129f4d3465877fbf82e98d6b3fb80c904860df4734a96dc4c2e2b8ff16a19bf0ff0bb5cff6bcba8924055a9e1c38ea9634de575d6b528c13159274bee4e028153b4525090a94d3b8260dbdcab0698c1c728e7614825de4181cc11596284b1f522a1df1af0a7b094b9003bd2f98fa9c6aa0f3686be18621607efd5fda80fa4c06ec679aa122a2e3f00f6f0eeddd065191cb80c6d8bb85d01fd767e61bdd93ec9472ed16849083325ac089c3ad89e24fa3bd903a99988590", 0xe0}], 0x1, &(0x7f0000003d00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @empty}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}], 0x38}}, {{&(0x7f0000003d40)={0x2, 0x4e23, @rand_addr=0xffffffff}, 0x10, &(0x7f0000003e80)=[{&(0x7f0000003d80)="1f74153489ed99fdfbe56233b5c0135504ef85092ae4c645d56be23a55056414bc43600e1355c40cc96b2b173d04152153f220810e809d11c614dc10a078e2411a49fc5ee893962cc8a38445a6eb4535d2894b1e1a3ccf37f5cf9a6617a9f1fbf52c6d253da5eeeba774b48f8eba408c64c7d02737dbe8c30cea655640a8a0193fd33317e1698bf61f24deb6beab76f8d6e61dc5defb3d97dc51dda7cfb69be7caf0abc476d79e179af96880c3c8b5e19cf23431f6fb104444dbc8c41800b5aec5d9819076588ed41a282ead647bca539b7d19fd07f59dec7927d486128786a144537b1f13ce", 0xe6}], 0x1, &(0x7f0000003ec0)=ANY=[@ANYBLOB="0600c300"], 0x10}}, {{&(0x7f0000003f00)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000005140)=[{&(0x7f0000003f40)="7e6c08cb0d082dedc4e87a2fe264180f78978d45db6333330da5297379bf818925376d0b2ac130f8062ec19352d383e16bdd44484add3ae7d3e76456d5ab9a596488bb596069607e5335436cdeecbee719a828bb79b309c5fe57648e59b4217b6a7dfdcdc5c777e68a7657015affef938b08ccbb59a32c6dab295d42fbcd734d1cad28af6f6b855587cfcc1e56564a3c093edee8e7d72546", 0x98}, {&(0x7f0000004000)="3955dae3608f0bc475224a4dc9abf2e45166b496c3fd0636d0cd806b72cfc007264a733241fd0e80aa", 0x29}, {&(0x7f0000004040)="f45d609ddd5a404bd400eff6723f81d4971faa2cebdcfc7666bd3b708268e87bbf4df72534609382d2a831bb16c03570e95647a43917fbb42894c4de8acba828e7afe7711d3a8c46d52df15a1e4f9e8c604784713edc6b46", 0x58}, {&(0x7f00000040c0)="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", 0x1000}, {&(0x7f00000050c0)="bd768051d9883a7c877cb03e936ad7706c1704114b729718f620f68f87622720e4732591952f1eafe2bf5232bb3021cb69799ef2a4ee09befc82bad2ea25ad2fb16591bc9152cf70625a03b5c3865620ad64c3b2c2c8ccd69eb34f69b2475d9ca4d61297ad6a118c05aaf0a8d04a31b8a58b1bcd43e524", 0x77}], 0x5}}, {{0x0, 0x0, &(0x7f0000005700)=[{&(0x7f00000051c0)="5614a55e8446a9c87833aff15ff0e293099d9f9ad9c580ab17b8dff997e8d39740fcd88f07cb21dc541d74300d1b47b45768daeb5123853254d27c000853777e946845db061d286b73c75bcc8a0f5705340e76c42bdfd4dfc15b2f935029e222be555b52e9f68fbd65b24df1a1ec97d18ce36c36e1f2248d25277bde16166df9a6d9a055b78a3bf337e25aaaa481b7350e257a1d0b3b44", 0x97}, {&(0x7f0000005280)="aac1fbf89205cddc001aab2123bd72fda1deefd46f13c5296226572da73970e370d587df9ce69fcd7ffff7cb7f0764110b7d1e59c2745bb434bb2728ea6ab47923f1e9c8c50f18c979de0e6e33c01922256706675f19162f90e7cbc1a4a20f0b9ecaea296703418d8c48eb4e3bf8baf9e6bb8e50f0ca7d9a966d09cdd0bdfa7ad5070b75500b687304bc", 0x8a}, {&(0x7f0000005340)="1a0d873ae5bff5287a5e39028cdae9f3b276bd57d0a85a74fcf3982e8350a27156f577d70a9a4f31b6f92d0c6b12d92d2f5ab18ee5604500ab06494371037f220fb996dc310beff15a68bff17b47a6498453aed290f5e1979f1ae1ce7a8587885ef2662da0abcdcad090b05e8af83287c5813b0c946700a0c65ff6b707e4206683fbdc1a98975fdf2920f64d646ca007ed7d8f915270693b0393c713da48c7e2d5eab476fa7f16bcbc210bf344421a65541eb0b39faaccfe22eb192bb50c01b124", 0xc1}, {&(0x7f0000005440)="d4307c339d7f85e07df059e1cad90f421bf68ec9863afba2b57861f0c252f1caf1fda65988cfab062b3b903d45b7b67ca08d79759dfa2e00282a9b209f2e5dd4d9bccffba72c15d8c86ea7448ef1ac3a894f713d8517021015238753043f7b68477979a4a5b598244950948896590a7ff68363e687cb9e8b91b2bca1a5620aa3edd643d80a49a6e41c37842b3ac8998f731adf863156414ff84669839ea1c8dee0ab3d95ef08f4cd1f9d0bbadc306f6636f4234c5f38d58b64a8209dfb8cdd0896a4be05d5d4d6bbe2e7b80027de2b706ac179829d7f7b49375afb5d6da0ca80333e073bc7e7fffef4cd6c5507fc66938c10ed0f63", 0xf5}, {&(0x7f0000005540)="abce7e0d9c37785a572061010c47663737f051bb27af91fdf1ccc3820179809f8b9e141654c87aee32f066a18faf9c22f9e3209a60a6c2c752d09a8df8564eabfdf7ba97a256c3339bfa50edd1522fe928501405d418514ebda281de1470a5f4", 0x60}, {&(0x7f00000055c0)="675eb0161341f1ae8b53b5a7e9dbd7c729630fdd465270e07de63241e010988b8d429040c60e46732e6322610c955f82799c203811ae63274f417d4e62c999f89e39c2027f4e694259e46b59cd29e1391bf95bf898873a1f3a898836781dc10f62af54087a018525d9458c44419e3ed64ff7ad1ac268dca56a0c1f1747be610ac7b9bebb5c7b59b2d3eb5d70f791dda37fb11b735a7614d6a755a8b57a847b55ca", 0xa1}, {&(0x7f0000005680)="073f5adabd9f13f44c59dd56438fd8430cc258c1286103fe6d1b5757d4b604c9299551abeca2f8c7e40c", 0x2a}, {&(0x7f00000056c0)="94e3", 0x2}], 0x8, &(0x7f0000005a40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xe8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfffffffffffffffd}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x15a}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x5, 0x3, 0x1000, [{[@local], 0x2}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast1, @dev={0xac, 0x14, 0x14, 0x1f}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @loopback, @initdev={0xac, 0x1e, 0x7, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0xf0}}], 0x6, 0x800) setxattr$security_selinux(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)='security.selinux\x00', &(0x7f0000003c40)='system_u:object_r:root_t:s0\x00', 0x1c, 0x2) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r6, r6, 0x0, 0x8800000) 04:04:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) timerfd_create(0x7, 0x800) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c107164b5b74a7b7842cf61ad9f9150c20a69b86cdd259b4a8e2dbd6194f5914ef1cb5e56970d9c04024b9e21243a518b0a89b1a8942ad36f805f33d76fb9cb17cd2745d59d6f2c3e8312c974a84c8683dafa57b61d66057aa098b25d149290315dd29365f55ea062ac55c59ffe11"]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:13 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:13 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000001f00020000007f0600000000c301fcff01000000850000a6e1006200000085f3f8ff1000000025063000fcffffff1810", @ANYRES32=r1, @ANYBLOB="0000000000000000bc71f1ff08000000630be0fffcffffff9500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x2, 0x0, 0x0, 0x40f00, 0x1, [], r3, 0xc, r0, 0x8, &(0x7f0000000500)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xb, 0x2, 0xa800000000000000}, 0x10}, 0x70) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = dup3(r4, r0, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r6, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048000}, 0x880) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r4, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:13 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3ffe}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@seclabel='seclabel'}]}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:13 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r2, 0x0, 0xfffffffffffffd13, 0x4000000, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x1000, 0x6}) memfd_create(&(0x7f0000000000)='dev ', 0x0) ftruncate(r4, 0x80000080040001) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) recvmmsg(r3, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@nfc, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)=""/123}], 0x2, &(0x7f0000000680)=""/108}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000700)=""/164}], 0x3c3}, 0x3}], 0x1b1, 0x0, 0x0) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:14 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d0f572102e19289016a49a5af5c679ecab49eeb151c78efdca88bb37fe8641e96f462b675b5a7ebfb3ef0dc8760b72107227ad9d9f0ff0d6094e966061964e8936180246eb1b9799506000000d6df96c5492e04bd", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4a0000, 0x0) 04:04:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:14 executing program 4: lstat(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000180), &(0x7f00000002c0)) getgroups(0x5, &(0x7f0000000340)=[0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee01, 0xee01]) r3 = getgid() getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)=0x0) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() getgroups(0x9, &(0x7f0000000680)=[r0, r1, r2, r3, r4, r5, r6, r7, r8]) r9 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_buf(r9, 0x29, 0xfe, &(0x7f00000005c0)=""/135, &(0x7f0000000740)=0x87) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r10}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r10, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:14 executing program 2: pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x84000) write$P9_RSTATFS(r0, &(0x7f00000002c0)={0x43, 0x9, 0x2, {0x85c, 0x3, 0x0, 0x9, 0xffff, 0x2, 0x3, 0x1, 0x3f}}, 0x43) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fadvise64(r1, 0x0, 0xfffffffffffffffc, 0x3) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000100)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = getpgrp(0xffffffffffffffff) r5 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r4, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r5, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:14 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0x4) write$binfmt_elf32(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3ff, 0xfffffffffffffffc, 0x10000, 0x100000000, 0x5, 0x3, 0x6, 0x6, 0xec, 0x38, 0x279, 0x8, 0x1, 0x20, 0x2, 0x6, 0x9, 0x2}, [{0x6474e551, 0x28, 0x200, 0x9, 0x6, 0x1e4, 0x3ff, 0xa00e}], "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", [[], []]}, 0x1258) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) 04:04:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:14 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003e80)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/108, 0x6c}], 0x1, &(0x7f0000000200)=""/129, 0x81}, 0x800}, {{&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000002640)=[{&(0x7f0000000340)=""/235, 0xeb}, {&(0x7f0000000440)=""/73, 0x49}, {&(0x7f00000004c0)=""/65, 0x41}, {&(0x7f0000000140)=""/7, 0x7}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/140, 0x8c}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/52, 0x34}], 0x8, &(0x7f00000026c0)=""/215, 0xd7}}, {{&(0x7f00000027c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003cc0)=[{&(0x7f0000002840)=""/101, 0x65}, {&(0x7f00000028c0)=""/108, 0x6c}, {&(0x7f0000002940)=""/70, 0x46}, {&(0x7f00000029c0)=""/97, 0x61}, {&(0x7f0000002a40)=""/105, 0x69}, {&(0x7f0000002ac0)=""/4096, 0x1000}, {&(0x7f0000003ac0)=""/213, 0xd5}, {&(0x7f0000003bc0)=""/42, 0x2a}, {&(0x7f0000003c00)=""/14, 0xe}, {&(0x7f0000003c40)=""/66, 0x42}], 0xa, &(0x7f0000003d80)=""/222, 0xde}, 0x141}], 0x3, 0x21, &(0x7f0000003f40)) sendto$inet(r1, &(0x7f0000003f80)="82d729303e1b2c9fdd86c3c09b3c3764d6377827072ca8dca4748d63577b4bda4b36533af949b2b44f5b733f204b3c4d73d83c37a6f83e7d7c4bfa7d18d05746", 0x40, 0x40, &(0x7f0000003fc0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) dup2(r1, r0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) 04:04:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x42100001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x600000, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) sendfile(r0, r0, 0x0, 0x8800000) 04:04:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x4, &(0x7f0000000340)={0x0, 0x2c, 0x0, @thr={&(0x7f0000000240)="289e2738093c8133b0c40b917a28475fbb59b0286b484bc6591ac0c0cc82ad783ba638e92ecaf36bafe4a987155bffae485aa0", &(0x7f0000000280)="7fbb8cc89c67e8e03c54e96b30a6625adfe303d35711ee9a48e066cadae71f1fd873555843148ccb223bf5a36ad5b0145f03744998cbe0d9e63aa81323be2e0739e7a64d67f38b3537b331f34cb3942d21369332f1bbb29ff3f8a3c0ba73ca176cda3546ca44cdbf989f91ebca3d5e"}}, &(0x7f0000000380)=0x0) timer_gettime(r1, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xfffffffffffffe4d) sched_setattr(r2, &(0x7f0000000180)={0x0, 0x3, 0x1, 0x3, 0xec8, 0x8, 0x7ff, 0x5b90}, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x21) sendfile(r0, r0, 0x0, 0x8800000) 04:04:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:17 executing program 2: clone(0x20000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000200), &(0x7f0000000240)=0x4) setxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:semanage_store_t:s0\x00', 0x26, 0x2) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) unlinkat(r3, &(0x7f0000000100)='./file0\x00', 0x200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f00000000c0)={@empty, @empty, @dev}, &(0x7f0000000180)=0xc) 04:04:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x2) recvmmsg(r0, &(0x7f0000001b40)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/153, 0x99}, {&(0x7f00000000c0)=""/60, 0x3c}, {&(0x7f00000002c0)=""/232, 0xe8}, {&(0x7f00000003c0)=""/240, 0xf0}, {&(0x7f00000004c0)=""/226, 0xe2}], 0x5}, 0x9}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000640)=""/185, 0xb9}, {&(0x7f0000000700)=""/202, 0xca}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x401}, {{&(0x7f0000000840)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000ac0)=[{&(0x7f00000008c0)=""/194, 0xc2}, {&(0x7f00000009c0)=""/103, 0x67}, {&(0x7f0000000a40)=""/80, 0x50}], 0x3, &(0x7f0000000b00)=""/193, 0xc1}, 0x5}, {{&(0x7f0000000c00)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c80)=""/76, 0x4c}], 0x1, &(0x7f0000000d40)=""/43, 0x2b}, 0xff}, {{&(0x7f0000000d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000e00)=""/77, 0x4d}, {&(0x7f0000000e80)=""/60, 0x3c}, {&(0x7f0000000ec0)=""/221, 0xdd}], 0x3, &(0x7f0000001000)=""/73, 0x49}, 0xdda}, {{&(0x7f0000001080)=@l2, 0x80, &(0x7f00000013c0)=[{&(0x7f0000001100)=""/171, 0xab}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/176, 0xb0}, {&(0x7f00000012c0)=""/213, 0xd5}], 0x4, &(0x7f0000001400)}, 0xffff}, {{&(0x7f0000001440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f00000019c0)=[{&(0x7f00000014c0)=""/132, 0x84}, {&(0x7f0000001580)=""/212, 0xd4}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/243, 0xf3}, {&(0x7f0000001840)=""/223, 0xdf}, {&(0x7f0000001940)=""/125, 0x7d}], 0x6, &(0x7f0000001a40)=""/225, 0xe1}, 0x556}], 0x7, 0x2, &(0x7f0000001d00)={0x77359400}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) prctl$PR_SET_FPEMU(0xa, 0x1) 04:04:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x8000, 0x194) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000580)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@remote}}, &(0x7f00000007c0)=0xe8) fstat(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000000880)={0x0, 0x0}) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xee01, 0xee01, 0xffffffffffffffff, 0xee00, 0x0, 0xee00, 0xee00, 0xee01]) r8 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@empty, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000ac0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000b00)={0x0, 0x0, 0x0}, &(0x7f0000000b40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000f40)=0x0) r12 = geteuid() r13 = getgid() sendmmsg$unix(r1, &(0x7f0000001000)=[{&(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000540)=[{&(0x7f00000003c0)="9e65a9045f68d59f90bbe67bd30697cb40c2852a864ec386efbefcde660a4bb8478e2d1ffe32ec2726b972ebb239942d852868a5ef021734d4d601aa4fc4c3619d2d827c638faf56e1", 0x49}, {&(0x7f0000000440)="49ee70b2cf6a5f0f22f57bb0ce421c0d3122d243ab94edefe2b857bd42727cffb54c31cd0afbeeab3cc2bed9e9e005df5c6423c268fe46db5b5e4171794892e89d9e049dab2744cf23744f6c4b2fafc8ce731dfab74fba6297d74b22f9f179f28c5b25f7ed11b970c9b6b16f6f4d9ee1a4d6197012aed6bd1719f4f1ed0c4893ef3db8bf7877ea765d6493118813b8572c7734a9b45fa03e1055f574d4722532", 0xa0}, {&(0x7f0000000500)="77ef784f941c7a", 0x7}], 0x3, &(0x7f0000000b80)=[@rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @rights={{0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}}, @rights={{0x34, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}], 0x140, 0x40000}, {&(0x7f0000000cc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000f00)=[{&(0x7f0000000d40)="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", 0xfb}, {&(0x7f0000000e40)}, {&(0x7f0000000e80)="02ec95fedc77c17844946fd6ab8eeb9911552174776991a579bded5871498a6e1424c6403ec571437e39e03f8a6414a6b5c120f1daea00f5f34623174d4dc1196f2f3e4ec5b10026", 0x48}], 0x3, &(0x7f0000000f80)=[@cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}], 0x78, 0x4004010}], 0x2, 0x40000) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r14 = socket$inet(0x2, 0x4000000000000001, 0x0) r15 = getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001080)={{{@in=@initdev, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) r16 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r15, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r14, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r16, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000000c0)) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:17 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="700000002800000829bd7000fcdbdf2500000000", @ANYRES32=r1, @ANYBLOB="0f0000000e00010005000e000800050006040000080005007806000008004abd66880000080005008107080008000100647272000c0002000800010000000000b87ee2856b03aa1f3b48a1cf219ee6c2080005000809000008000500092000000800050006000000"], 0x70}, 0x1, 0x0, 0x0, 0x7b00e0962748917c}, 0x20000000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) bind(r0, &(0x7f0000000300)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0x1a883bb9}}, 0x80) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x80000000089) sendfile(r2, r2, 0x0, 0x8800000) mount(&(0x7f0000000380)=@filename='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='fuse\x00', 0x8, &(0x7f0000000440)='drr\x00') 04:04:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'filter\x00', 0x38, "6f40a7af2af87d9edbb4dadd7d0c68ea0b8325400f2cf7cdda13be763ab5999a0127dc0872ac7f14240b01f0cbddbc194f387b6df8ab1d7c"}, &(0x7f0000000200)=0x5c) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:18 executing program 3: r0 = getpid() tkill(r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 04:04:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$KDENABIO(r2, 0x4b36) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000980)='TIPC\x00') prctl$PR_GET_FPEXC(0xb, &(0x7f0000000640)) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000600)={&(0x7f0000000500), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r4, 0x700, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0x1) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f00000007c0)=ANY=[@ANYBLOB="00000000fcaf556ff2cf11c71ee2fdd100540129814515949eb0e385523b5c0151b1a3702797234a2affa45ef24048863f14b7d79b53155f12a3bef75459e875f86515841a3108b8ed725537ff4d88432d4c058e50023fede6e72d6668128b841562352a5d3e90896f37d1099d06512329591a2ee2b600b32a0f428862b00898400c69e45694", @ANYRES16=r5, @ANYBLOB="040226bd7000fedbdf2515000000640004000c00010073797a3000000000340007000800020097000000080004000100000008000400660100000800030081000000080001000700000008000200d60000001400010062726f6164636173742d6c696e6b00000c00010073797a3100000000900004001400010062726f6164636173742d6c696e6b00001400010062726f6164636173742d6c696e6b00001400010062726f6164636173742d6c696e6b00000c00010073797a30000000000c00070008000300070000001400010062726f6164636173742d6c696e6b000024000700080002000200000008000400ff03000008000300010000000800030008000000"], 0x108}, 0x1, 0x0, 0x0, 0x400d0}, 0x804) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000540), &(0x7f0000000680)=0x14) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100080}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0xb4, r5, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x5, @ipv4={[], [], @local}, 0x100000001}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ifb0\x00'}}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb20}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x40000}, 0x20008080) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:18 executing program 1: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x18080, 0x0) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0044672b8d507dd03059fab6c11d28f2619660856e3343a5448c8f188199569b0679b2b8e3ede3311d54a16c0c5e2342b0cd58b2a3dd72512025c033be61d391308a39e1078ca1747e145e27e907dd892278d73fa313cff201393e1233d98d0363230b7dcd9c573f95411cc89d143c39ea51f001dd06ffa5c0a6b611b8faa7a2fc1424bb5a8676cb024c339a"]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x40000000, 0xfffffffffffbfffd, 0xfffffffffffffff7, 0x409}}, 0x30) 04:04:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:18 executing program 4: r0 = inotify_init1(0x800) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 04:04:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x10100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:18 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) socketpair(0x5, 0x8080e, 0xfffffffffffff801, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000040)='rose0\x00'}) sendfile(r1, r0, 0x0, 0x8800000) 04:04:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) sync_file_range(r0, 0x4, 0x400, 0x3) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:18 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) accept(r1, &(0x7f0000000200)=@nl, &(0x7f0000000040)=0x80) sendfile(r0, r0, 0x0, 0x8800000) 04:04:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl(r2, 0x0, &(0x7f00000007c0)="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") fcntl$setflags(r0, 0x2, 0x5) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) inotify_init1(0x80800) 04:04:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x10) 04:04:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8000, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_thread_area(&(0x7f0000000580)={0x0, 0x20001800, 0x4000, 0x0, 0xffff, 0x1, 0x0, 0x2, 0x843, 0x3}) r2 = socket(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000680)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000780)=ANY=[@ANYBLOB='*'], 0x1) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df13e70d8588f1ad9e9cd0cc47ae90ad0cf973c95a00b6cd00"/49], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000900)=@nullb='/dev/nullb0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000840)='\x00\xc2\x92%(\"\x83\r\xf2z\xf7\x9c\x1c\xf5\xf6\xad\xdctD7\xc3V\xa1\xcdgi\x18Q\xb1\xf0<\x8a\xc1\xe9b\xc84U\x99\x8f\xc6\x17$N\xe5\xde\xcd\xc7\xd7\xd87\x98B.\x92<.\xf6\xc7)\x0f!~\xc7W\xd8\x1c\x00\x00\x93\xaa@\xa7\x10\xc1\xef\xf1!\xfbZ\xc2\x87\xe47\xe4\x1aS\xb3\x16\xe3\xec\xba=.\x06\x13\xa3$Df\x9a\xc8\x94\x88/\xd5~3\xb5t\xf72\x99I\x9a\x19<\x18#T\x7f{#\x95-!7\xdf\xd8m\xf4\"\xf8\x94\xba\x92\xdf2\xfc7!S\x857\xf9V\xf9\bw\xa3\xceZ\x0f\xf2\xbc\x88r\x8bl\xf9\xae/\x86F\xaf\xfe\xf0', 0x820, &(0x7f0000000780)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x10, 0x1, &(0x7f00000000c0)=@raw=[@ldst={0x2, 0x0, 0x6, 0x8, 0xf, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x5, 0x3ff}, 0x10}, 0x70) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) r4 = socket$inet6(0xa, 0x100000000003, 0x4) sendmmsg(r4, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0xfd34, 0x0}}], 0x400010b, 0x0) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f0000000000)) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:04:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:19 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101200, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x24, r1, 0x5, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9, 0x8}}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) 04:04:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',r)}tmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653030303030303030303030303030303034303430302c757365725f69643d3d1bc7b47874db4dd891e077f2331c403064da1ed0d5638ccea5a24e4acd25facb5bbef7880257e5ee9c098e1ee3016275141ad22a413bb9537c9a67da9aaec2e40cde42b4c71542f24245ddf3cf304e553067159a872ef3cae5a4201f6e3cbdb280690ee478eb870cab1de2bf49b300a7816cd1d938af7cc999c3937310dadc315e4d9ede078f86c81bb241dc1f997a949c1f23d9122bb59d69f7abd214a45dac2d8c4f475f31b4a52decf500a1", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:19 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0xfffffffffffffffc, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) r1 = dup(r0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000000c0)=0x0) sched_getaffinity(r2, 0x8, &(0x7f0000000040)) 04:04:19 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:19 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x100, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group[id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000140)=0xe8) r3 = getgid() fchownat(r0, &(0x7f00000000c0)='./file0\x00', r2, r3, 0x1100) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:19 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:19 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x200000, 0x0) sendfile(r1, r0, 0x0, 0x87ffffc) 04:04:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000200)='user\x00', 0x5, 0x3) 04:04:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000340), 0x1000) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000001340)={0x0, 0x20, 0x7, 0x41fa, 0x3, [{0x7ff, 0x2, 0x10001, 0x0, 0x0, 0x200}, {0x200, 0x401, 0xf9, 0x0, 0x0, 0x202}, {0x9, 0x7cf3, 0x1, 0x0, 0x0, 0x284}]}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x40000000, 0x0, 0x8}}, 0x30) 04:04:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:20 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:20 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2000, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) sendfile(r0, r1, 0x0, 0x8800000) 04:04:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x359000, 0x4) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x22140021ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = signalfd(r0, &(0x7f0000000080)={0x8}, 0x8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) signalfd4(r1, &(0x7f00000000c0)={0x81}, 0x8, 0x80000) 04:04:20 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:20 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:20 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0xc01, 0x0) r0 = dup(0xffffffffffffff9c) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x46780, 0x0) accept$unix(r1, &(0x7f0000000240), &(0x7f0000000100)=0x6e) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x400, 0x0) io_cancel(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x2, r0, &(0x7f0000000200)="6cb0c13f10232054c64c3b1a41d9640e1846ad283bee07eca471da03d8c9bf97d68844c55bd708e7c705d7bef4e7ab8f79011c9a674c639197115eb55b01f7ed326d322724552e7d079eab12e407736b63", 0x51, 0x2, 0x0, 0x0, r2}, &(0x7f0000000140)) sendfile(r0, r0, 0x0, 0x8800000) 04:04:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:21 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4, @multicast2}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)={0x28, 0x3, 0x0, {0x2, 0x7, 0x0, 'user_id'}}, 0x28) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_MCE_KILL_GET(0x22) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24, 0x1000, @rand_addr="497f17a69a88178e77977f419a49d496", 0x23}, 0x1c) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x602, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x1b, &(0x7f0000000280)=0x1ff, 0x4) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000300)=0x10000) sendfile(r3, r3, 0x0, 0x8800000) r4 = fcntl$dupfd(r0, 0x406, r3) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r4, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000800}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00012abd7000fddbdf250300000008000200060000000802"], 0x2c}, 0x1, 0x0, 0x0, 0xa22c8e7422ce977a}, 0x4010) 04:04:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',g\t\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair(0x9, 0x80005, 0x3, &(0x7f0000000800)={0xffffffffffffffff}) r2 = getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000140)=0xc) r4 = getgid() r5 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getpid() stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000640)=0x0, &(0x7f0000000680), &(0x7f00000006c0)) sendmmsg$unix(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000000280)="1ef70057cde4d10c841c434c1dcac2f36461c23b69f87d9d76d7352893eaf819e27d6e2c76e6cab6c5d93775472f08d68d5f2bd2fcace4d1edaf832955b96fa8f7b4e7513734b44adb15b1f0b009430c1e8e464ec0e92fc4190c74065ad135b2b47a20ae77fa1fc919a4bff4b27cae073f028c373c7f580fc3147b6fc8d0aa1a4823", 0x82}, {&(0x7f0000000340)="489930daed95a06cbc876578e92782cd06f020b285c16533ee75ec5c35ad7c77f55d08963e83d0ffa638803a5f31181907a07dbbe31a5c4fa313b88eb625bdcb3285ec5548fab5a47a594fba9c4f54bafd72080f04dd77472858659cc883838d03ae5fb9dd2b269f978ac5207749521df4cdcd75dd411bc262a542d8356dc325d2fdfd192b6e068c82726085f6c0c0eea46d16d1e0f34c33e4cf9ab158496dcbe3f99938de2398b92bfb56cf3d7e661aa954fcddea2e65f24ecdb3e971", 0xbd}], 0x2, &(0x7f0000000700)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}], 0x90, 0x8040}], 0x1, 0x50) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000840)=""/237, 0xed) r11 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r11, r11, 0x0, 0x8800000) 04:04:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',root}ode=0000000000000000004000\b\x00user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x22, &(0x7f00000000c0)='\'vmnet1cgroupposix_acl_accessGPL+\x00'}, 0x30) r3 = getpgrp(r2) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r3, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r4, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x10000, 0x0) flistxattr(r0, &(0x7f00000003c0)=""/4096, 0x1000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id'}, 0x2c, {[], [{@permit_directio='permit_directio'}, {@hash='hash'}, {@seclabel='seclabel'}, {@dont_hash='dont_hash'}]}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000180)={0xffffffff, 0x7, 0x6, 0x12a00, 0x5}, 0x14) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f0000000100)={0xffffffffffffffc0, 0x12, 0x8, 0x98, "ca3d06235e68bb8c0cea3f68f9344bdef3ee315b23bb02b7276fada135e82806"}) 04:04:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000040)={0x1, 0x1}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 04:04:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cb5a14865d778570bc467559860504c37bdfc2795e17d"]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/l2cap\x00') r1 = open(&(0x7f0000000180)='./file0\x00', 0x80000, 0x11) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB='lr|\x00\x00\x00\x00\x00\x00\x00000000000000000000400+0,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="89e2802d6fcca5b264b3c902d8a1394280be033c75871bf201218139449a0f03af2876f818c0184c99b6fe228d016e59112669f8f095289d4b1eda13a61a99bfe92f9d52afbbcaa11e31ada535ad5de67cd0176bb3a64926bb424b5a0de066a4f55a6d0da0434c9f191d14c179ef84e7"]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:22 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) fcntl$setpipe(r0, 0x407, 0x101) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000040)) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) inotify_init() sendfile(r2, r2, 0x0, 0x8800000) 04:04:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd85, 0x6, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:22 executing program 4: mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,ufer_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_DIRENT(r0, &(0x7f0000000240)={0x78, 0x0, 0x4, [{0x5, 0x7f, 0xa, 0x101, 'ppp1system'}, {0x5, 0x7, 0x7, 0x0, 'user_id'}, {0x4, 0xb6, 0x6, 0x0, '{%%/-#'}]}, 0x78) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x0, 0x4}}, 0x30) 04:04:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) dup(r0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x800) 04:04:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) getdents(r0, &(0x7f0000000000)=""/100, 0x64) 04:04:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x80, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r1, 0x4) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 04:04:22 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 04:04:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000200)=""/85) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xfffffffffffffc62) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000280)=r0) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x3, 0x0) 04:04:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000240)=0x1c) listen(r1, 0x1) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000280)=0xe8) r3 = getgid() write$FUSE_CREATE_OPEN(r0, &(0x7f0000000440)={0xa0, 0x0, 0x5, {{0x2, 0x3, 0x5, 0xbb7a, 0x2, 0x6, {0x0, 0x7, 0xda, 0xff, 0x9, 0x100000001, 0x5, 0x259, 0x9, 0x1, 0x3, r2, r3, 0x3af76afc, 0xfff}}, {0x0, 0x12}}}, 0xa0) 04:04:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) chdir(&(0x7f0000000000)='./file0\x00') 04:04:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 04:04:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) r3 = socket(0x2, 0x5, 0x7) connect$unix(r3, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) get_thread_area(&(0x7f0000000200)={0xffffffffffff07c1, 0x20001000, 0x2000, 0x80000001, 0xffffffffffffffff, 0xe33, 0xfe, 0x2, 0x7, 0x8}) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRES64=r0, @ANYRES64=r0, @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705fe9643d", @ANYRESDEC=0x0, @ANYBLOB="ff03"]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x5103) 04:04:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 04:04:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x20) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 04:04:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x101001, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000100)=0xc, 0x4) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x20800, 0x0) read$FUSE(r0, &(0x7f0000000340), 0x1000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f00000000c0)='syz0\x00') write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x1}}, 0x30) 04:04:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x0, 0x4}}, 0x30) 04:04:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x80000, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x100}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 04:04:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) syz_emit_ethernet(0xcc, &(0x7f0000000340)={@empty, @broadcast, [], {@generic={0x88ee, "863cf2b775fd7f01a8765e49c62ba9ef613693b2742a7192c81c2af44cb8f113cd67478accbadba3bb719f24729fa53c147223ddf699a6d9704778a1b809bfa5ff01a43cb80cab22d9d6cd0feeae905f891dd4276a414f8c0522063abe2555db52a3d36a6db9dff0d98b300d32d476aa8557f65c9f9df053d8a5dabd7775bca33df3f571af2dbde9228c5532be51e838c240cd40d6fbfac6a44be926412df30a20c84e595e69b1ecae18ca78ad8f48ae55afd90d6704f90d3bcbf937ecc2"}}}, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readahead(r0, 0x81, 0x8f) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40000, 0x0) write$selinux_context(r1, &(0x7f0000000140)='system_u:object_r:mtrr_device_t:s0\x00', 0x23) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f00000000c0)) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) dup(r0) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 04:04:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x0, 0x4}}, 0x30) 04:04:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:23 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0xfffffffffffffffd, 0x0, 0x276d2dc00, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) 04:04:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000100)) r2 = getpgrp(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x0, 0x4}}, 0x30) 04:04:24 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)=0x0) sched_setaffinity(r0, 0x0, &(0x7f0000000100)=0xfffffffffffffffb) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) lsetxattr$security_ima(&(0x7f0000000300)='./file0\x00', &(0x7f00000005c0)='security.ima\x00', &(0x7f0000000600)=@v1={0x2, "69ad16c06c0f59889403b97f5ffd0ecbf42466"}, 0x14, 0x1) r1 = socket$inet(0x2, 0x4000000000000001, 0x100000000000) r2 = getpgrp(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xfffffffffffffde5) r4 = syz_open_procfs(r0, &(0x7f0000000240)='net/ip_mr_cache\x00') ioctl$RNDADDENTROPY(r4, 0x40085203, &(0x7f00000004c0)={0x8001, 0xd3, "ff09f877cf8bbd661145060041fbe6be6b69d2bdd51cde03be16c0aaf79af82aa840e919d1795b2297419e5dee02b27e748d89cd4f571c2e73acc872241b05aaa19ad69b57d22173b4014f89f6ee849f7d4d8dd21bf54cdb80e3f6ee2acc4a7bc7f6af1d753d75f3f716aef8921301caa8a309222ed203fe065b31387bd1eaf59d5fef83bff6b8c7e64b80f12bb49bb6cca172336d3c18840599da1e3f3b8277c691e0f37e791554b39a7e61d18e0faf1de1fb4f3118b9d0aefa8119a2df759b869b3bbdd8278d338b16abf08ac40ed7e44e19"}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r3, 0x2, 0x1) getpgrp(r0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, &(0x7f00000002c0)=r4) 04:04:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6808, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) fcntl$getflags(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cmdline\x00') ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000040)={0x3, 0x757}) 04:04:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x2000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000001}}]}}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000000c0)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x0, 0x4}}, 0x30) 04:04:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) exit(0x8) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000380)=""/142, 0x8e) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x8000, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=""/143, 0x8f) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8008}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x40, r3, 0x209, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9fd}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8001}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4890) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x7fffffff) 04:04:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x90044021}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x84, r2, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1000000000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x401}]}, @TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffff000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xac2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8e}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x78}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x40000}, 0x8010) 04:04:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6808, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) fcntl$getflags(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cmdline\x00') ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000040)={0x3, 0x757}) 04:04:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 04:04:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ptrace$cont(0x38, r1, 0x4, 0x7fff) getsockopt$inet_buf(r0, 0x0, 0x2a, &(0x7f00000007c0)=""/4096, &(0x7f0000000200)=0x1000) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'gre0\x00', &(0x7f00000000c0)=@ethtool_dump={0x3f, 0x4, 0xffffffffffffffd4, 0x5, "7549a56aa4"}}) 04:04:24 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x6) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) signalfd(r0, &(0x7f0000000000)={0x3}, 0x8) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000400)={&(0x7f00000006c0)=ANY=[@ANYBLOB="d4010000", @ANYRES16=r3, @ANYBLOB="14002bbd7000fedbdf250a0000005400090008000200ff0f0000080002000900000008000100000200000800020001000000080001000000000008000100030000000800010001000000080002009a07000008000200050000000800020007000000c0000500080001006574680008000100657468003c00020008000400090000000800040003000000080001001f00000008000300fdffffff0800040015000000080001000f00000008000400000000000800010065746800140002000800040005000000080004001f0000002c0002000800040020000000080003000000000008000400070000000800020003000000080001001500000014000200080001000000000008004400010001000c000200080004000b0000000800010065746800ac000100380004001400010002004e210000e29a0000000000000000200002000a004e2200000001ff02000000000000000000000000000102000000100001007564703a73797a32000000000c00020008000400010000000800030005000000080003000100000044000400200001000a004e2000000008fe8000000000000000000000000000aa02000000200002000a00ffff000003eefe8000000000000000000000000000bbf8ffffff3a630fd7b6acd7de82b0b38f5e5edac3fa1a708307d045e4f40c0464ce8ec2290e4c75cf6b4065175af99a33b15d31de306c81227e4e3266d980efb9d92bc64e3eb414ebbdffe69de646d9f804eea01e1b03eb3f6000b8fe24e31387a209001613c80f5c337ca741ed12708a86366e2634b2d841f6d51034be8ca8882c5668a3d78d884bac233f4d17aadc4a7227b4c459990e1a3ad1bd4d5afa251ac9b6709beee61d31a1d3088ec1af62f55ee3e642a4385aba73adb0b45044a0c57436de55e001d4ca5f7e652581df145782170af5"], 0x1d4}, 0x1, 0x0, 0x0, 0x4004010}, 0xc081) sendfile(r1, r1, 0x0, 0x8800000) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000680)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8008}, 0xc, &(0x7f0000000640)={&(0x7f00000004c0)={0x174, r3, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x48, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4c702ca3}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5b3}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5f6}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x228b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA={0x54, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ae99c3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5187}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1306}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x100000001, @local, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x40}, 0x200488c0) 04:04:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) exit(0x8) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) seccomp(0x0, 0x1, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0xb1ab, 0x9}, {0xe90, 0x0, 0x400, 0xff}]}) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6808, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) fcntl$getflags(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cmdline\x00') ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000040)={0x3, 0x757}) 04:04:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x837, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)="158894da1764a6067fb172efbfca1035de37507a769d05503fdc87fa7839d53ca379524e9f7df2dabe5ecba4ba0cd0967eb339697e4f510431ea2c53315f1d876bbfa09eafdf95321cc09e7952186c92427c4028070ccc7013a3311859f326dbf67680cb8bfb059309127a8c91ec78d37e537398f23a18f39d33f330485f7a0c5d237b976c879d6d40db6975a0b70af86c30f2156c5882399e828b36") r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_subtree(r3, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) sendfile(r1, r3, 0x0, 0x8800000) ioctl$TCSETSF(r2, 0x5404, &(0x7f00000000c0)={0x3f, 0x4, 0x0, 0x6, 0x5, 0xe279, 0x100000001, 0xb6e9, 0xac6, 0x0, 0x7fff, 0x2}) 04:04:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000000c0), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) lookup_dcookie(0x100000001, &(0x7f00000003c0)=""/154, 0x9a) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) keyctl$get_security(0x11, r0, &(0x7f0000000480)=""/195, 0x5f) 04:04:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x6a000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) r1 = getuid() syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x4, &(0x7f0000000280)=[{&(0x7f0000000180)="2b03", 0x2, 0x7fffffff}, {&(0x7f0000000340)="ec8be865d91511bb5f3bd3a29f057701a292352042b3dbccc7b319dac2b4d1ad3935056d505e25781d39d346da5872724c3ce3edac7afe6ddf96a2952743f477bf9788d47fba1fa74fde17d5595e9d755d9454c51d7e74599c8a532f2a5fffd0a15e7369fb5f740f32351d17542e34fa07e73a4093786f669fe9e10fd7cc3b91c4088a2d69f68e29ec5c024f5a9ec2df046ce4cb3522182e06d9388b47fec133bd02cb29c07b028ce395765f6945892648645e3d65694ad6c68b90813ba1cf83594b1b4da60bf2d2c64038f02a", 0xcd, 0x4}, {&(0x7f0000000240)="c3750c1792c9755bc0c2291a", 0xc, 0x7ff}, {&(0x7f0000000440)="e2c5bd47157378dc99869f49d4ceec96919f64a9b90c698bee37171db4fbc5a2a3412108e42a6ec9e846140e95c6077b7ce20f68e1d3c2369840c82c27e8e2fbe57707a2996cd6689749e2da18e0445547c5944b0194de8875b255384f029688304054823f41fdb255fdd7ab03aa168535d09a9a3a894918e342892f9040a2a3e63968c300bd954372e2c896c6cbdc11cc48fc7e2971b156b8a1fdc903d80560bfb1db3c23e3e3b962f492d9e6d4d977a68b6da1180b42666241d873", 0xbc, 0x2}], 0x80, &(0x7f0000000500)={[{@usrjquota='usrjquota='}, {@nojournal_checksum='nojournal_checksum'}, {@journal_async_commit='journal_async_commit'}, {@i_version='i_version'}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@debug='debug'}, {@init_itable='init_itable'}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fowner_lt={'fowner<', r1}}, {@subj_type={'subj_type', 0x3d, '/dev/fuse\x00'}}]}) 04:04:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000040)={0x1, 0x1}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 04:04:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x400, 0x0) io_cancel(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x2, r0, &(0x7f0000000200)="6cb0c13f10232054c64c3b1a41d9640e1846ad283bee07eca471da03d8c9bf97d68844c55bd708e7c705d7bef4e7ab8f79011c9a674c639197115eb55b01f7ed326d322724552e7d079eab12e407736b63", 0x51, 0x2, 0x0, 0x0, r2}, &(0x7f0000000140)) sendfile(r0, r0, 0x0, 0x8800000) 04:04:25 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r2 = socket$netlink(0x10, 0x3, 0x13) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') io_setup(0x5, &(0x7f0000000340)=0x0) r5 = open(&(0x7f0000000440)='./file0/file0\x00', 0x101040, 0x11) r6 = dup3(r1, r2, 0x80000) r7 = creat(&(0x7f0000000740)='./file1\x00', 0x1a) io_submit(r4, 0x4, &(0x7f0000000880)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x8, r1, &(0x7f0000000380)="d060acb576afe49e22daa4ecf5e2f5f0f91a8d2863675424774d5e1659cd1e4cbfea10b15288d955ffb924dc30fd2cdb5e7ccbaa90ca930e20825ee35525a743604e025cd552df6c1d6e115b593131d5d7a51de543590c1df7707cd76b38b1fd999429a6a13edbd020e25a90659e62519902d448cd19d7cf9786e455d55e106e10b9da318f14669ed6035628aa607ca062984b2f", 0x94, 0x7fff, 0x0, 0x0, r5}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0xf, 0x5, r2, &(0x7f0000000540)="e8d88259dee2733b8ce9f8edc73164b8a617ee0f1a44d904301563b853e97644fcb083cff1f823f4fef377dea7ef5100fa46aed80f4c115ca112899b2d9afd386dabacf4a958f486ccdb55ea1dd44d93acbff22bce316b089f016da56453d4598e93a25af0383d5f51cf7bb3145e84c9973dcdc25912b53528e01c973f0aaeb215", 0x81, 0x717d, 0x0, 0x3, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x7, 0xffffffff, r0, &(0x7f0000000640)="7a159d34d91dcb3434729d17b1d3deb16cccc8626b740d928b609b51069cc9af9b803a213c258a88c3a6910dc376702f3ccbe4f21fbe7b71eaa71f41ab56043609d7478aa37584e4074feeaa90ea76cdd9295ca5136ea5124f1d2505f6ba202503688eefabe94b90d140f716b145ded33953ae75c62e02a888a20df1d9cc13ba0c1a8a827ae1ee49754c499cd41ad2176ab868c82676c12a62abdf317262c9565feb49bac7b7759826bc68b484b9cf9d3549f525e87b82d2139066ef7150a15a60596d685e676834f86b45", 0xcb, 0xff, 0x0, 0x1, r7}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x7, 0x1, r2, &(0x7f00000007c0)="28fd0f8de44d2d76b29b970638ce16524dcbafcf3b45783a6cce900ac47c84cf42f00cc5fdfa37421a2a78cebaa76ffd0c458706b8ec1fd5bab32f65e56ddde359cac0", 0x43, 0x6, 0x0, 0x0, r2}]) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000900)={0x0, 0x8f}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="02030609100000000000004cdf388b9eb50e08c59e0000000200130002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a00000000f48d000000000000000000001700"/136], 0x80}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmmsg(r8, &(0x7f0000000180), 0x400000000000002, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10400}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3bed00fcdbdf2503000000200001000c00070002eb6ead820000000800020021000000080005000300000008000400ae04000000000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x1) sendfile(r1, r1, 0x0, 0x8800000) 04:04:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pwrite64(r0, &(0x7f00000000c0)="929ed67d18f7ad26993e5385e3269a12c59b4994d96932b0027423c1ef0b465f6277e30032d680b8791a064dfb95263794814398ff67f2c4ef48ca6e", 0x3c, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000001, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000000c0), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) lookup_dcookie(0x100000001, &(0x7f00000003c0)=""/154, 0x9a) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) keyctl$get_security(0x11, r0, &(0x7f0000000480)=""/195, 0x5f) 04:04:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) fcntl$setflags(r0, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) [ 648.233815] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:04:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000100)={0x15, 0x7, 0x1, {{0x8, 'GPLwlan1'}, 0x8}}, 0x15) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000003, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) [ 648.327792] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:04:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:26 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003e80)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/108, 0x6c}], 0x1, &(0x7f0000000200)=""/129, 0x81}, 0x800}, {{&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000002640)=[{&(0x7f0000000340)=""/235, 0xeb}, {&(0x7f0000000440)=""/73, 0x49}, {&(0x7f00000004c0)=""/65, 0x41}, {&(0x7f0000000140)=""/7, 0x7}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/140, 0x8c}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/52, 0x34}], 0x8, &(0x7f00000026c0)=""/215, 0xd7}}, {{&(0x7f00000027c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003cc0)=[{&(0x7f0000002840)=""/101, 0x65}, {&(0x7f00000028c0)=""/108, 0x6c}, {&(0x7f0000002940)=""/70, 0x46}, {&(0x7f00000029c0)=""/97, 0x61}, {&(0x7f0000002a40)=""/105, 0x69}, {&(0x7f0000002ac0)=""/4096, 0x1000}, {&(0x7f0000003ac0)=""/213, 0xd5}, {&(0x7f0000003bc0)=""/42, 0x2a}, {&(0x7f0000003c00)=""/14, 0xe}, {&(0x7f0000003c40)=""/66, 0x42}], 0xa, &(0x7f0000003d80)=""/222, 0xde}, 0x141}], 0x3, 0x21, &(0x7f0000003f40)) sendto$inet(r1, &(0x7f0000003f80)="82d729303e1b2c9fdd86c3c09b3c3764d6377827072ca8dca4748d63577b4bda4b36533af949b2b44f5b733f204b3c4d73d83c37a6f83e7d7c4bfa7d18d05746", 0x40, 0x40, &(0x7f0000003fc0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) dup2(r1, r0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) 04:04:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x81, 0x12) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 04:04:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x800, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x40000, 0x0) 04:04:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@context={'context', 0x3d, 'staff_u'}}, {@audit='audit'}]}}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r1 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='scalable\x00', 0x9) sendfile(r0, r0, 0x0, 0x8800000) 04:04:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:26 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r2 = socket$netlink(0x10, 0x3, 0x13) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') io_setup(0x5, &(0x7f0000000340)=0x0) r5 = open(&(0x7f0000000440)='./file0/file0\x00', 0x101040, 0x11) r6 = dup3(r1, r2, 0x80000) r7 = creat(&(0x7f0000000740)='./file1\x00', 0x1a) io_submit(r4, 0x4, &(0x7f0000000880)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x8, r1, &(0x7f0000000380)="d060acb576afe49e22daa4ecf5e2f5f0f91a8d2863675424774d5e1659cd1e4cbfea10b15288d955ffb924dc30fd2cdb5e7ccbaa90ca930e20825ee35525a743604e025cd552df6c1d6e115b593131d5d7a51de543590c1df7707cd76b38b1fd999429a6a13edbd020e25a90659e62519902d448cd19d7cf9786e455d55e106e10b9da318f14669ed6035628aa607ca062984b2f", 0x94, 0x7fff, 0x0, 0x0, r5}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0xf, 0x5, r2, &(0x7f0000000540)="e8d88259dee2733b8ce9f8edc73164b8a617ee0f1a44d904301563b853e97644fcb083cff1f823f4fef377dea7ef5100fa46aed80f4c115ca112899b2d9afd386dabacf4a958f486ccdb55ea1dd44d93acbff22bce316b089f016da56453d4598e93a25af0383d5f51cf7bb3145e84c9973dcdc25912b53528e01c973f0aaeb215", 0x81, 0x717d, 0x0, 0x3, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x7, 0xffffffff, r0, &(0x7f0000000640)="7a159d34d91dcb3434729d17b1d3deb16cccc8626b740d928b609b51069cc9af9b803a213c258a88c3a6910dc376702f3ccbe4f21fbe7b71eaa71f41ab56043609d7478aa37584e4074feeaa90ea76cdd9295ca5136ea5124f1d2505f6ba202503688eefabe94b90d140f716b145ded33953ae75c62e02a888a20df1d9cc13ba0c1a8a827ae1ee49754c499cd41ad2176ab868c82676c12a62abdf317262c9565feb49bac7b7759826bc68b484b9cf9d3549f525e87b82d2139066ef7150a15a60596d685e676834f86b45", 0xcb, 0xff, 0x0, 0x1, r7}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x7, 0x1, r2, &(0x7f00000007c0)="28fd0f8de44d2d76b29b970638ce16524dcbafcf3b45783a6cce900ac47c84cf42f00cc5fdfa37421a2a78cebaa76ffd0c458706b8ec1fd5bab32f65e56ddde359cac0", 0x43, 0x6, 0x0, 0x0, r2}]) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000900)={0x0, 0x8f}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="02030609100000000000004cdf388b9eb50e08c59e0000000200130002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a00000000f48d000000000000000000001700"/136], 0x80}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmmsg(r8, &(0x7f0000000180), 0x400000000000002, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10400}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3bed00fcdbdf2503000000200001000c00070002eb6ead820000000800020021000000080005000300000008000400ae04000000000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x1) sendfile(r1, r1, 0x0, 0x8800000) [ 648.952006] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:04:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:26 executing program 2: r0 = socket(0xb, 0x0, 0x2) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000000c0)={@empty}, &(0x7f0000000100)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x447, 0x0, 0x0, 0x400, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:26 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) fsetxattr(r0, &(0x7f0000000000)=@random={'system.', 'keyring\x00'}, &(0x7f0000000040)='\x00', 0x1, 0x1) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 04:04:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast2}, &(0x7f00000002c0)=0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) setxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x2) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8000, 0x0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000200)=@sha1={0x1, "7bbb379bbd4e960070641ee125a098aedbb96517"}, 0x15, 0x1) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x8ab, 0x1, 0x40, 0x80, 0xef}) 04:04:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="ac00"]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r1 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='scalable\x00', 0x9) sendfile(r0, r0, 0x0, 0x8800000) 04:04:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000012c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100001,user_id=', @ANYRESDEC=0x0, @ANYBLOB="32a9016bbb091cd2643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = fcntl$dupfd(r0, 0x406, r0) read$FUSE(r1, &(0x7f00000002c0), 0x1000) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0xfffffffffffffdd5, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x0, 0xfffffffffffffffd}}, 0x30) 04:04:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000000)='./file0\x00', 0x8100, 0x20) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 04:04:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = dup(r0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0180"]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x516743f0047bd3f7, &(0x7f0000000200)={@local, @broadcast, [{[{0x9100, 0x8, 0x8}], {0x8100, 0x5, 0x7, 0x2}}], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @dev={0xfe, 0x80, [], 0x2b}, @local, @dev={0xfe, 0x80, [], 0x20}}}}}, &(0x7f00000000c0)={0x1, 0x1, [0x346, 0xe36, 0xd54, 0x85f]}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 04:04:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x101000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x20002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x2d, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @dev}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3e) fcntl$setstatus(r1, 0x4, 0x2c00) ioctl$TCSBRK(r0, 0x5409, 0x7) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = accept(r4, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}}}, &(0x7f0000000180)=0x80) sendmsg$IPVS_CMD_SET_DEST(r5, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100002}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0xb4, 0x0, 0x500, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2a}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x17}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4000000000000000}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x400}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1f}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7f}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x10}, 0x4000080) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:27 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='*eth1\x00') r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0xfffffffffffffffc) sendfile(r1, r1, 0x0, 0x8800000) fallocate(r0, 0x8, 0x101, 0x5) 04:04:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='\x00\b\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffa, 0x0, 0x0, 0x800, 0x0) 04:04:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='btrfs\x00', 0xc0082, &(0x7f0000000140)=']+^user\x00') r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x400000, 0x0) write$P9_RAUTH(r0, &(0x7f0000000240)={0x14, 0x67, 0x2, {0xa8, 0x2, 0x6}}, 0x14) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 04:04:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_pts(0xffffffffffffffff, 0x200000) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000000)) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 04:04:28 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0xffffffffffffff49, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x8000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x100, 0x3, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x7, 0x5}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x3f, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x80000002}, r1, 0x7, 0xffffffffffffff9c, 0xa) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000100)=0x1) syslog(0xa, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) getegid() 04:04:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:28 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f0000000240)={0x4, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}}, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x108) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r3 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000140), 0x80000) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8000, 0x8, 0x7ff, 0x0, 0x0, 0x7fffffff, 0x4, 0x6, 0xd, 0x4, 0x8001, 0x100000000, 0x7ff, 0x800, 0x5, 0xfffffffffffff800, 0x1, 0x8001, 0x200, 0x96d, 0xffff, 0x0, 0x5, 0x6, 0x1, 0x1ee7, 0x4, 0x4, 0x0, 0x4, 0x360, 0x7, 0x1, 0x9, 0x1, 0x8, 0x0, 0xc59, 0x3, @perf_config_ext={0x1, 0x4}, 0x10, 0x0, 0x1000, 0x4, 0x8000, 0x8000, 0x1f}, r4, 0x4, r0, 0x9) sendfile(r2, r2, 0x0, 0x8800000) 04:04:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f74348564653d30303030303030303030303830303030fcb9da257bd313839430303430103030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:04:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00027d", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303009739d277d07bcc4da0e84be66a6000000000000f02f06ee299a3034303030302c757345725f696439", @ANYRESDEC=0x0, @ANYBLOB="0600726f7570040000007719c9b3c88aa6d0", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x104) ioctl$VT_WAITACTIVE(r1, 0x5607) 04:04:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=@known='system.advise\x00', &(0x7f0000000240)='user\x00', 0x5, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000200), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="b2998a118400000000000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.stat\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) clone(0xc8403, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 04:04:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c030000000700000044", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) rt_sigaction(0x14, &(0x7f0000000180)={&(0x7f0000000080)="f347dee92e66672ef2440f12e766420f71f13df30faef5f2460fe6d73ef040818cb80b000000e4000000646626f340a4400f8ea20893acc4417a7f0b66440f5f443000", {}, 0x8000000, &(0x7f0000000140)="f3262e9dc4c1a562f366420f38051864660f38de8098000000c403791d1804d1be09000000d8b700000000c4a17566d23ef0180246c183000000000c"}, &(0x7f0000000380)={&(0x7f0000000280)="66430fd28a0080ffff660f6becc4c3014ccbf6c421f852970a000000f3430f52e267660f3806ab0480000064f30fa7c0f20faef2c4e3e179b8f42f00d08ff3470f118700800000", {}, 0x0, &(0x7f0000000340)="c4a13b11ddc48199f6624d6644dda50c000000650f0f2433ae652636f3400fc7fb47d9fbdbe4c4a3bd7c5ca02602c46371445b91dcc481fc112dee570000"}, 0x8, &(0x7f00000003c0)) clone(0x800000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x400, 0x0) ioctl$BLKRESETZONE(r3, 0x40101283, &(0x7f0000000100)={0xffe0000000000000, 0x5}) 04:04:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0xc00, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x80000, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_ids', @ANYRESDEC=r2, @ANYBLOB=',max_read=0x0000000000000400,max_read=0x0000000000000e52,max_read=0x0000000000000002,max_read=0x00000000000000e4,defcontext=sysadm_u,hash,smackfshat=rootmode,obj_user=fd,pcr=00000000000000000035,\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c75733f725f69643de47c9d18238866ff9d770c95ef80e74f3e9e33accc90037cd8208a7fdd79de3c9845546f0bc9c99f3d2bf756de2e64380ddf6ee25a1edba10c572608a036751eeba7859ff0e1abe95dc0eaff7fc36bc7cbb282be558c2b2d7453b85cd6c854d73ab272870bf5cbf7de738c9a1324e4fc568f4892d4f73ef42f3b7685beaf088b1776c26f505a1f786d5ab2ab7cdadab00c45ab51a4bc186c86edf72623", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x20000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) mount(&(0x7f00000000c0)=@sr0='/dev/sr0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='bdev\x00', 0x809444, &(0x7f0000000240)='-.\x00') r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$apparmor_exec(r2, &(0x7f0000000300)={'exec ', '-\x00'}, 0x7) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x13, 0x0, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r3, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x4, 0x400}]}, 0xfffffffffffffebc, 0x3) write$binfmt_elf64(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffc, 0xffffffff, 0x8, 0x9, 0x5, 0x3, 0x6, 0x9, 0x90, 0x40, 0x62, 0xd58, 0x400, 0x38, 0x1, 0x8a5, 0x2}, [{0x7, 0x1, 0x100000000, 0x5, 0x8000, 0x2, 0x5, 0x1000}], "5197e701a4fe53d4f01d087f2a52b396d660a33bc24e7e4cf8b82752a3ce80b1753d1f74aea9b8dacdb824a3b5710e48d4d8061d9d617291ecebb501630a43e29776f8f1b0c4e319f6ef44ba17678c6013bab0"}, 0xcb) prctl$PR_GET_KEEPCAPS(0x7) 04:04:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x400, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0xec, r2, 0x809, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xd8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffcaf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6ac48282}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x733}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x76ecaad0}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0xec}}, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8100}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r1, 0x304, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) 04:04:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75700a9969643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:29 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x1ca) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x3ffffffffffd, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @aes256, 0x0, "c3bc74ec955c3e9a"}) 04:04:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgrp(0xffffffffffffffff) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x4) r3 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r2, 0x7, 0xffffffffffffff9c, 0xa) r4 = getegid() setgid(r4) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) exit(0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r3, 0x2, 0x1) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x120) ioctl$VT_WAITACTIVE(r5, 0x5607) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x80, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 04:04:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) r1 = dup(r0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000007c0)={@in6={{0xa, 0x4e22, 0x0, @loopback, 0x6}}, 0x0, 0x4, 0x0, "a62905a8144903a326978e6b57bae7e50294a0bad25e6fd630db3d4d3199b6d3bdb9b9af8e6f071deb934dfc07ac0b6753caf204bcadd1fa5d430da994d32f74b0d2756dbd72cadeda45665a47f6d931"}, 0xd8) 04:04:29 executing program 4: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000280)=0x20, 0x4) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000180)={0x75b1, 0x7}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6664177d7c8e0c003d", @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d7cdcb994e530303034303030307f000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="4805"]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x80000}}, 0xffffffffffffff52) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000240)=0x0) ioprio_set$pid(0x3, r3, 0x0) write$binfmt_aout(r2, &(0x7f0000000340)={{0xcc, 0x0, 0x2, 0x2fb, 0x2fe, 0x42a05517, 0x113, 0x200}, "306811bfbc79bcf33c974f9d7f66823ac2a14041b48ad860adc6e4b9928caf3ed033dd890e3b036b0d7ad251370c8795faeade52f266b1", [[], [], [], [], [], [], [], []]}, 0x857) 04:04:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0b") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000000c0)={0x1f, 0x32, &(0x7f0000000080)="6cdc29656e06181d3b20b182daacc24a558ad5cb7eab4876eceabfe4aa5ca7577b250932dc4f61fbd2e1c059b6acb5cd1f0b"}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0b") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:30 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="66648efc3c4cd962ed6dee1975b738612258c2a671cfd9258c88f6505ec883e8168fe2fb70f49e800635", @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64753d30303030303030303030303030303030303034303030302c757365725f69643d5ce7b92e1516db16f7cf2c2f5bdc226c0f1693f015cd529c09511fe54ea50fb874e27eed63072d14cf75e423ad7f032626f5ff307e7d29a65c1ba708123435ecfd8a836c2000a8f5b6ef72e6472600829c81b989371a0cfc3f917eec2c5c5c83f1b9b4fa7c73643a5bb85f20c8ab09bbd328099f2a06ee8a1103602e7332bb98e3fd387c26", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:30 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_tcp_buf(r1, 0x6, 0x9, &(0x7f0000000480)="bb683ecceac7f2434d9051d7af29e85726f0e81e8c0300000021f1fe4e9fd6aad556f3e53f3d70c74042ad254faa192863e5b414a94e5a60739eec057361b7a674ad1c780b47f40dd8ace9f0b0653ff29d63760f2b763df81f24d804501633deb0334fd4084ff72add5a5a53ffb24e92779d0c14e36ffb1b0dd3d113e3e1807489523c141dfd8ac1925899d48cd8f252320fc6411d00da9adb10b5e34a6fbef4f74c222d07a2ef", 0xa7) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x80) sendto$unix(r1, &(0x7f0000000380)="4c0349ecdf8caabb8ff1c731b8cad2fbdd4512e1a07b5335c76adbad102d9b5c584961647d7ffe6adaa137325c8a163c58f5824d6ed05c13acced8149b67c03181a46114343035f2", 0x48, 0x4000, &(0x7f0000000400)=@file={0x1, './file0\x00'}, 0x6e) write$9p(r2, &(0x7f0000000200)="e33914b9ad1615305922f1428a95de6239f8b4b16a25725a74976b6a67d6d3b3ddff3546c53c8067357b1fbaac4d90a4499599105b8c7cbd95a30ee21e18004918097505f633c3973e0b80403af0594f4c02b9b74d73bbec8ad9f1df1f7162012bcc30aab31bbb7ad0780e17023ce5cc4c35497097a3012a0cc091ed77f31ec56cb860f9ff134543177ddc27f414c29cd48c7dbdd8bef4df67acc4f139157902878b9df9e0690258a179a5091e", 0xad) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f00000002c0)=""/131) sendfile(r3, r3, 0x0, 0x8800000) 04:04:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x8020000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r0, 0x2, 0xfffffffffffffffb) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0b") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = getegid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x8003bfe, 0x0) sendfile(r0, r0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000040)=0x8) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c4601020704040000000000000003000300050000009e020000000000004000000000000000490000000000000056000000810038000100000001f8ff0353e574640900000009000000000000000400000000000000040000000000000006000000000000000700000000000000040000000000000000000060010000000080000000000000920000000000000005000000000000007000000000000000fafffffffffffffff0ff070000000000121ee297a5e4b929e9822ef44df281281677ebb5793f73aa2be97df9c34ab2645875a5ed030bcc567f968444b9f727bc39e4c9bea2314062ab851d665348d531955502549a3ac2473748f9ef628d70cc0b4e73a48a26ae9b024a36ced4f69475d298e00b4dc110f55ecdea02ead87efe2e6ca2e6a2933e199da90ca847656f73a3c832c3c7a77554b162d9556593e6cca9bc38df80190c74f06f4adfbe41d1d3e27164a44dee4bb7cf9e7754adf40a3069c7d91a13a073bc55f68bf14bc5444ada4f4841550014eff7343ac696bd4d80277d3a2fcf0aa91b0d9d1b569477cc329aec16fbd346ab20e334479e02602d469f8d9f86c2bfc2fc2708ce9f16d2eb69c0526370d79a27e39882019b0a1350a9ab3e951f8fc509912e3a9961d2fd25d0fd1fc7e3e0579acdfd2b9ccb8b3be7bf783ce5a10910de9d6a627704b9424963d156e1537f3489da36385d0fb886589c72b355ddee764b782a81b8b7e35ad993fa13f0623a204249ddc77a9480af7c07b97f18a25faf3fb40e8b0315afcda31a7be9c5e747779408a7123523c5ae27c998b2508be5938b888635e9b9b50504d8e604e6fa119c1decd01d0c0d17a9fd2d5bf83cd84672f005f503af3b3744634651ab085724fc082a4180ed8d438c958cfb41ccf3e92c9e28658358bfb7742231c2cb57a33aa6db8fe207c62b6b001a71ac7747c1f9fac471e90ef9e48242e1d692f2416e225d22ba397a7ee90e0aba5573c3379c4503e436ceb4ff9785b0cd6f9a8ae31b748a2113367fbff90648505b4adee8a8c8822813edbde3af131dc6cb0fa39e31c41932740a52d3d6420689907f4d20a4cf79dc5b769151d3fcec226abb544afbc1a89f35fa597605a96583f00ae5c969a2adca6e325bc03ede3313d47d5e6d1cad2b05be4a92d0bd0cd68adcfe44a8681887d93f8dc478886c9be0bc1e9b06eac6a8dbc3d07f254c4725d210265aa97121c0371f3606ebe103ac1ecfc53b03899a56674ed2df069914b54292b2f492aaea6216a6d44e2934f2b20039552d05949a5f814f8a3fd8be539e41ccedfbaad8bc471bccfe2ce6856c3dd3fce3111b95b044b293106062a7d98d734a9d6c0d540f951a78b1c46bc9af535494a4bb048d9c59f2dc6b097b9554d331f4edd4bab2251da62eb052d55470d27beb4761dabbee74a20c48345ce51040646658ae2a60f087155a7dd9f1e9a92d704ae2e3bef73ef75d74dd782c5be74d95cea85074dac0cb39ce6f93ba4802cf35800fd2c9a9c13c7ac899ce264c79c5f28b116200762d8cc86f21c2968aff56395b33e098289da2620f78ead4300fc437536f7378f56011200545883608a620b8cc2317bce391640915e7b19a6c9080b3d74fdede6339d90b75dad6f4b567b7cfbd7c78dbd9227e6abdb80971efe21a7c99eba5b9ea2726e7078574f88ec3577628d0d3f5bc74d933ebe90b3afe2e696a2ff41fe96107a149a897bf9c9aeb3cd3c4f6a5c3325118c05cf89e52ae5644e04fd671aeeeba3a815860c4c9330a7704f4bf4578f55901ad8836777d41548a4428628f22d3b6b3e68c1a4118df28f116f659991d4cbd13414fd4fbc300f36483e30d1a8003fb232d2c29dc0fb20cb4bc30588c6ce864e1de704e2e8cc191532a805ef87a922be94f68857d7e396a4091022faf93c48f5f00d3c1f499d89089e7b9a8548467a179fdd9a1c9bed01d312ef2a7ba6e3a9d00471b5ebb8ee06e2a11c3b2ed815f915cd23c70a8ef799fa4553036bcfb8b8e3f985608aa93018cf194ce0125e1f461fbbef7813092de8ac3d69a34f28f7f9302e9b887aac140b396689c827a44177cacf96af2d5ec3eaa4c39306af8a984b86ff01c879e59b0502dcf86b9884fae9467be94aa22d24561567d357ddb05494d3c8a0c9838821dd24b43f2ef6a1d343c74cdabb41dfce97e288727397e24d3186947f6ec7de8f16c9b3cb36366ee2ce2d88bf31340c4725347f8279f11a71c5ded009935a57264853da9aa04133e91060a108fc22382fd940d3f72e138b46906cef6989ce1628f7acea6e9b0590f844ba5ba7eadb3dd430601d3c99d674cc35effeedb51ce25a51db300d7431c942f05d7ceb6ae190491afa4aa21967b97429b0b246c0b97f4693e923066933632281856afba189e359358c64dc8ae994d7e97c30b37e25661a1a2c216460eace7f091b4082e40bdb368616c628bb43e5ed67b85c1e01b8c417dbe5d24880e485be25dc3e4caf37c54c0671feb4cfe9561712dff25769e1c11b55fdef069da36c62d6f34440f8091c74675487314c6e426910e7060b7b6ee1b2a53e9577b4723df2c746111dfb58917d42e3f60325826994044a334849265ef1bb73397ce994eff6257de46605dffd87cdc893169ef7c089893b347064065d787d835a201040c6b1cec5a11d9b5c08b8190c5ff83cea6cd978df48f7970b3d1a789e5e0e31d6a47e68c2b17b861803159dae35964af05f911e3471ce53bda95e4da24081a110dc32ceb74aae989d05ea9d0945f1527fbc287192a71aeb277c61c3f7ff61c3201eff8949cad00a0267ed3d1b5be017de785f1d9cf67e9ce9e219272301479359def324ec132880b05e121138e5b4509d4ea22f619ec75877de0b2fceeec71e089c26decf7a7a730fa9b793679245b6ab6593058edcbb942d17adcdde5f58e0bfba33e08da528ca32cc6778c19c174f0a7979b657e997d0e396701fec519baa8d52da70238dea664aa5171356914aa9e974d9ee1ebde99e01caac71f7c21d30db1440c615f47640329e3ff0f006f2026d724d564e2478ec2a72d26bd43286672fa88a5238107cf3ee30719a0b185f28b3ac734e72561bd2ac6056f0285e76ca2410c0421720a4068386ea2244c0641cf7a13912283118b4c194a2d4fb945b925ab47674297d7248cf67dc7f0091d5d68f55feee66fee7b26464431d3a9f8da96acec5cbf8f7e81ee5f4dc53c94c68f107739fb57baccc97d744473527921917832ed41d1b0328bab1ad6a6ffc49c86bf5f20867923d9fd08d29c5e8f7c87d1435a480e38862e896caa32e73e699934ece1772900e8f6dfce20ea249c15280acfd3055b80307215d2cfa187ec4ac4ae1b19032dcd79d6fab71a0a2f619f434a70cb0682e2f16c6f602691f33b334205fa9fbfb46d181635802e7dcd568a4893ff534c86e64398d0a696d66c86ef9c4fffb23f2bd9a7136dbf599a3bb06f4ad3f2ee92a67b48826196a6a28fa16c7564743ad4c09669794aa63fc047d8c64e0a4d3a9700ec335dc64cd79adbf24e3d135ff343d45bd11047d85e9d07add1ed3bc8afdceb1afe284ffb589f1f152c0da8e08fbed0a3dc74b95b834428ea45aed79dd3a3246f01a4569adc1d1508b28f488c3aba066b425ee50371371626f6e1ce87ae57b52326247a2487a66d134d7e05b8c84b21dda070fc278e3ca51753e2ced2dc14c5ea327101e5af42feb2f75b32dfb9f5fb756da6f993b2819d75d9bca538de87ef24742007f4539340a886faae01cafb5e6fadaaae40db036fd931c24d019eddc78fbfa4b96246a60ae618ff383a97eeb10580c0a60a0e98d432a0a944252d5a4263b84d781810cbd0a4c519e86a408d749259e1627d416ec10bc23f8215b847361fddcd7d74893ecf4847e675e2720ffbe234c20a6e79fd571f1bb4af0ee898665663a14e2bdfefe150d356eb8d00e4c4117cbc521600c7a2a4fc99afe9ec93e043ad1ddcf1ca266975f0867d52b165c5a8808df170e5096cce4d6bb5f4d4a2fc9d4267ebdb8039271f445349c4e79c3e2511a14ac068b97a170cd04e32fc240bb05b215e5c74537839dde3f3460bd76c80b7fbee752a239478d489d464ccfac6aba7f851146959806212607b0459640012fe7129d991b123bd30583e0949d834e59d37175873c242d87265af2f79c7ddb0859f72d94d6a42200f23cf0c40f36fe177959275ab96851ef74fc55e285a27bb39b2059222402d6fe80f8ab470c26f65fec942890f34aaf54ec83a21d56db44e35134dacf157955a90dae6c82ff8f63e7a0568b744e68447bb6bb4614d13720e69d160a8c51b27ad0305b6670836600c94dd52f8b88f690e19610deabeac2a49bdf7c31cb212fe2fc3fbd4b8e9b152f90647dac80ac0fcbb0c60cba837a9fecdae8a3f497988e6f80c7f1bf9a1d3b73d4d619ca26087cea724b408a37075c8e825157de2a19d3ebee7b580c6e930466e240e96cb933f2b46081d160e1ed266090a8dfcc24b80807643e1e8295b0e8726377895b180ffc5713b351006556ab6d4559a5ea59418da95ba41388b433eb110228684221b4b1d3a7b410388013b68dc88702945f7490c5fdb9d87a4e5177e9cdc41a6592663e9b36a961054b0cf311d10ad0a1d8c7e0edbb89bcad8ff9dfc74f2ef759452fb3dae59c9157eb7e1fd77ff210f7750181925f10090e1bc8f762a5be1ea717396bfecc6ec6ff6f47cc8b9eef75b93677a9b2c4e9c77c632f4cc08163a6b4d5a815b461538de46c8e59386bb26b554c661df1770bb6eb3419eff616ffdb51fc0b74118bc85f5abde65e433f99f779d6a022ccb40d49ef53750b87506010748090a122e446507312cafd9c7fb167e7bd4000e78b1bd11eab11b70a970f6687cfb739fc4ca8da5d0c69a3499c88139fe6bfa16d1994fe8b62b601a12f6b4f7d3f90d51b778ae874363afbf690c11fcaf46b0c4f1c34fa6cf83c8e710d5d985939f78ab1ec056a1e108e52a7c0d061b370a4920190ba89f592de4b4cf5428057de0cf57804067ca439fdd4e821365c9c2fe951c4dd128d5557126c2740c9297ba0dd5371174b65eb83be34bb0dd61740db1a005a7fc51a1e0b864e2c78330806bc8116fe9f489bd4c34e743021c64e65da4f0dbec21fc000d3fbf240e8c24ddf93b4ba89b82241dbbc7b4ac6833cfa57b3ae864451e72edfde13e7179114b98302dd311452d4dbf5da26299766dca1db95a083ad52a191df0e37ea8df0ed6de883cd1bc1ad97d664993afe91f33af3fe105e26cab44e68646a37dd782fa6524998639a13a86a2f3582cf34940277396997037cb386cf9747174aa1de478a2dc90ee72f6cc0ed95ec5a2ead1f19dd19bd11320efefffa87ffdf0900c61f5a3b89b37d0ba5b4f1caff4c4e4b90a69b3ce9a95ba6412c279f30e8251ed70099888e50e1cd0988ed4b1d791da024be536d88e04193512aefb5b43d0ba7f27f184ba9a709a546f3e0da651b0ea82f2748d4e0dead6ec2785bf61bdea305b36f291f93959e29e35b5367ab7ee3c36232f9b9b2d1254709a9b1305d94b3edf08491d401911fad52b318e69e17aaaf85f706cdf00aac9ff60e1a414f1526f6ab0b0d918783ab54e500e0860e5d676056405c42aa5ea1ce92cd54831a7e89211581ce9cf009947fa2831399164ab88b1d02172028e9cb205e10e25982aa8e56950422ebb9fa38266109d742aa1204d7119faf61eb190fceba88920c310e0139341e7064e9744b2e4b97ca4794697242ad4e32ea223954da254ab37d3db55dff6afbe6186c7a8e672ddc04abc56be42bbf9820648cf95d20d93e835a4359f78ead8246bc97706b038f5684fdc6329fa368d2e0cbbc5e490b46018de67d33564b9d71b7a0a2fdc41572d8f5003019a39b36fa7de58902abb650d9cbb54f7cf7530705d8b8cecdeb1b142b6c756a9034965e450facb41bd96efbc69bd2af2b917a2d17cd36f22465c717b90f0d7a8111ab3f4e99ff148d8957186159736bd6916a16f4c0f159fa4fa859189e3bd66f093b86c51f20000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ebff00"/6319], 0x18b0) 04:04:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d300000000030303030303fae61e68cdba4bc343030303034874f2e68750023c6", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4100, 0x104) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000140)={@ipv4={[], [], @multicast2}}, &(0x7f0000000180)=0x14) 04:04:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7b") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:30 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x105080, 0x1) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x100, 0x7, 0x6, 0x200, 0x0, 0x0, 0x500, 0x2, 0x47984c0a, 0x100000000, 0x56e, 0x5, 0xf2, 0x2a, 0x7, 0x1, 0x2, 0xb3, 0xffffffffffffff7f, 0x400, 0x1000, 0x10001, 0xf549, 0x800, 0x8, 0x0, 0x8001, 0x9, 0x15, 0x8001, 0x7f, 0x80000000, 0x8001, 0xd487, 0x3d6a, 0x7fff, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0xfffffffffffffff8}, 0x20, 0xc1, 0x1, 0x5980823cddabf778, 0x7fffffff, 0x7fff, 0xe}, 0xffffffffffffffff, 0xd, r0, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) capget(&(0x7f00000000c0)={0x20080522, r1}, &(0x7f0000000140)={0x8, 0x4, 0xe8c, 0x0, 0x1, 0x6}) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) 04:04:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$getown(r0, 0x9) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000004c0)=0x401, 0x4) ptrace$setregs(0xf, r2, 0x9, &(0x7f0000000400)="c82710e9e9b71e53fd99cc6c9d1e42da4330d6fcf5848488a3b55607847cafa2543724be5afd5836f387701552cf958e2cf904f4f3d36db76d6b8b808537c59122223bf654bbaa14b151df9d3cf8b9df91eb33015f457f75d1b0ff83a64cd86ed182469b5ec3edb85d956f893ee71022c1b3e307987a00462c42e4f94b7cb6ed5fe253bdeedd656745dea1b548d5fa7b836292") r3 = getpgrp(0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r3, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000000c0)={'TPROXY\x00'}, &(0x7f0000000100)=0x1e) fcntl$setflags(r4, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000500)={0x0, @speck128, 0x0, "537bc2c5cc5aedda"}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f00000002c0)={'nat\x00', 0x0, 0x4, 0x23, [], 0x1, &(0x7f0000000200)=[{}], &(0x7f0000000240)=""/35}, &(0x7f00000003c0)=0x78) 04:04:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x111000, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x200, 0x0) renameat2(r1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00', 0x5) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7b") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000002c0)=0x0, &(0x7f00000004c0), &(0x7f0000000500)) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x802000, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x20000000000}}, {@max_read={'max_read', 0x3d, 0x3}}, {@allow_other='allow_other'}], [{@dont_hash='dont_hash'}, {@uid_gt={'uid>', r3}}]}}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x80000001, {{0xa, 0x4e21, 0x10001, @empty, 0x5}}}, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0xc0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000100)=r0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = getpgrp(0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r3, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000200)='syz1\x00') lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r4, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030703034303030302c757365725f69643df4dd24903cccd553733a0d0ab914359518e21d014fa4ebb02b1d8bb95df072eebafbb28199c9115ce472c5134afa5cd725358c1f5c64fe64e2536ddd880ff11436165b97f0a7036f07879ff0fef1d992367a7601361e25d3cef1f447a05312aae8ece4fef1754f2d2b6f8f", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000001740)='./file0\x00', 0x8004002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000017c0)='setgroups\x00') ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000001800)={0x8, 0x8, 0xc000000000000000}) writev(r1, &(0x7f00000016c0)=[{&(0x7f0000000200)="46f65a83c6a06a61130edb03d62cd189b74df7142ca3671f6c06a006d079a8e332b3a5b58c1dd47c83ce151920447e4e4b9889e526f707028d5b958ea590a6911727460d8f160d6206a4cc67ac56f779c88b976a1b7e08a3e7f042386e657a76ae29463509b7b71602816efe2fd7cadf1150f3e7e315491115c9117f288d74ae98a40bb4a6375c823a6cf912d2954864d0ca567b3f0f0ac134f49d7cd1f6ae78b80ff6a5abf3e6faaa1592734af25917a78716a48d79a37a764cd031eda5", 0xbe}, {&(0x7f00000002c0)="34f3529744434822fb6774c861eb36cb4f73c72acbc0837f06b031a63bf5491f95daf9ef431d8a588736c0d33ea03ded316373013964e03e1f9e52aa33cdadb089049df35dfbd296ef7fdc1745ea689172ae49f3ea2a5376b3f71c56f0d454e83da07fbee8ac8cbfcf1a3f148ebeb7464f7a87b1239763d2de914e7534252a8ce693c6a307382b5b28e8a315866fc8b636330f5c761fec60c823cba9e40a42d6a405cb367f96167477904a83c50b413db2042153bfe5dc27d23bce2c835721ab60872e842878b2ec", 0xc8}, {&(0x7f00000003c0)="a8e73579ae49c2a6311866583d87655b20ac6c8b24a5744e6e4bc03e9a56c093ab388f381af3941cd4de370178158cfeec36ffb0aff971e8c6dc2a63a2f7e8440a7d0780885fd9689260dc7fde86d6ca8d5faf7b000333acb78c189f791d7f16b6638ff71ffc144cef106ed89a7fba63f3fb7ad194c88c152653c85c37beae1b02c70fe4dc947b23a733b7cfdcd32fb7d0af803a0cb97d5ce7216f3b04343a543b6a55382e0505b001eaabfc81f4043c720a82a9fb49e62b40d225d96a2ee98d7c3a98e23af47dc5908ff534159853", 0xcf}, {&(0x7f00000004c0)="44b6bf10bafaafc7d732fa3bccf9f87b6ec18fceb9316f9e9f031c157d60c32ca93df5e368913f273b69ab3ceb5c13aad2a2b93546ad268b2b050d811a73604f794ca0f55752bd3e7a6dfc0aef12b118263517bb1090cd76efa72edc8f2ef925ae3e6160299ed38cf43a82e613bcd6b7161000a2e054fe0fed3f2db37710d27f2ca025941380a0eee216ecd799a860d5c48045577e73bbc24d4c93169a510d65dc470615a2c040d50a18ee2df304564d132259ab6c", 0xb5}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000000080)="168d60b7117c251f1c4a87f6384718dbc4db454b0fcb66cf0adda85c54c843c88abdeec2b2dda146648d3801257f7213b5dc37ad21b13091a2538d67a094e0c2c4ea9243a5effd2b27a99b34862a1b19cdaa61af807aeb560dcc04c30a54895afc472934625e3dc1b4df274515f9f0f3", 0x70}, {&(0x7f0000001580)="ab69d17ec619a91bfbe97afe50e79df364e0c1987cd23c0f145f1c5656b959576b046f9c2b46108a8f7a3d4dfafd74e0a4efbcf3bd5769c828bee33ab80dddf92f5f8d1a86b62de4401471afe4b2bb2ef28e7d8b4ebb25c227c22f6660065ca16129aeefd6ec4b9c992efc47a2ee6d1b425a16fe50", 0x75}, {&(0x7f0000001600)="a88e801fcdb77709fd109d4bce39ecb6195ab8b059fda46a7c9a2cd1dfe28ed1e8bc114b19b17fa579b272fb845488ba6a4615dd1177751fe79f14bd49ec46b67ff2191e479015973b1e23d1be5afac84de8b4c78a2c8d847d6cfcf663e8d85431365526ad748058c877d328e02899d058a2aebd16adfba229048ecebc8b48b75af71212f230255179ef5146284b6f0d", 0x90}], 0x8) sendfile(r1, r1, 0x0, 0x8800000) r3 = dup3(r1, r0, 0x80000) bind$unix(r3, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) mknod$loop(&(0x7f0000000140)='./file0\x00', 0xc100, 0x1) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000001780)={0x2, &(0x7f0000000100)=[{}, {}]}) 04:04:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7b") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 3: r0 = epoll_create1(0x80000) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f00000000c0)='s\x8db\xba~\x95\x84\xf3S\x8e\xb8ystem_u:object_r:devicekit_power_exec_t:s0\x00', 0x36, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x8000, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 04:04:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\b']) pipe2(&(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80003) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000002800)='gre0\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be0") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) fcntl$setsig(r0, 0xa, 0x3f) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x5e) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000000c0)={0x0, @loopback}, &(0x7f0000000140)=0xc) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r2, 0x1, 0x6}, 0x10) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$packet(r1, &(0x7f0000000280)={0x11, 0x3, r2, 0x1, 0x8, 0x6, @local}, 0x14) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @remote}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000040)=0xe8) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', r0, r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000380)={'filter\x00'}, &(0x7f0000000400)=0x44) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) 04:04:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be0") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c728d6f746d6f64653d7b30303030303030304730303034303030f88c87702ca7ab5229de", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x102fe, 0x5, 0x0, {0x40000000, 0x0, 0xfffffffffffffffe, 0x3c}}, 0x30) 04:04:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x1, 0x1) 04:04:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2008020}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x78, r3, 0x408, 0x70bd27, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x23}}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x2aa}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x400}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x401, 0x9, 0x7, 0x7]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x2}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}]}, 0x78}, 0x1, 0x0, 0x0, 0x8050}, 0x0) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000400)='./file1\x00', r5, r6) fcntl$setflags(r4, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) sendfile(r1, r1, 0x0, 0x8800000) 04:04:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be0") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4000, 0x23) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) write$binfmt_elf64(r1, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffff9, 0x4, 0x103080cf, 0x0, 0x6a2, 0x3, 0x0, 0x0, 0x397, 0x40, 0x10c, 0x5, 0xc46, 0x38, 0x1, 0x924, 0x1, 0x1}, [{0x70000007, 0x2, 0x7, 0x7, 0x4, 0x81, 0x3ff}], "deefb865867d7c30b9830e4f3c4d0880b86a978126dcf71e44d2ee8f4b75de5c519bf8eaee4b5d4bb74cc168d616518d0a92e51dbe2ed8e8faa2a45b291ead64a1b31f8d57ab871db3ebbde86b8060235834d1937314694b1a1c68d5f697b5546e8a89966a9bdcd5eadfe54d010e3e5a2d8203ab8b29672d2f4cefedf5a66fd7342cc39d18c98b35c23055a65ad190074ad8cf778e9d45a92da4b535a4ac4f23fbdb19d68473f5f03ed3fa6ea73c", [[], [], [], [], []]}, 0x626) 04:04:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000003031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x40, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f0000000100)={@rand_addr=0x400, @loopback, @loopback}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = getpgrp(0xffffffffffffffff) r5 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r4, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r5, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:31 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x17) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) 04:04:31 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000003080)={'veth0_to_bond\x00', 0x400}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f646530303030050030303030303030303030303430305f69643d000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="81004121c715dcd299c88b5b2c529f32f6097484ce61d63c4054eb4e907da4401408c4d23883a1880760ee67f80712c58da6e760f619ef98875b1694f4d661ceddf894d93b7e861a912100471a7ee5c6cdd5c51c57fa24952da2dc487e5e7749e319dce403d24f365f77449e5918e0bf08f647c2dec0590ccd1f322a29ec0693ebc0728ae9c57339e045b0b5a724ea59ad930a4a1cfa20770de42dff3dc76d27fc57bd04fdb892eb23e2dcbd34930138496bb0b4ac52b16da25c64f21f5c02f27967f9ed8f633212f70d50"]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) r4 = fcntl$dupfd(r2, 0x0, r2) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000003000)={0x1, &(0x7f0000002fc0)=[{0x9, 0x5, 0x81, 0x20}]}, 0x10) getsockopt$inet6_mreq(r4, 0x29, 0x1c, &(0x7f0000002e00)={@loopback, 0x0}, &(0x7f0000002e40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002e80)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast1}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000003480)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000003580)=0xe8) accept$packet(r3, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004bc0)=0x14) sendmmsg$inet(r1, &(0x7f0000004cc0)=[{{&(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f00000024c0)=[{&(0x7f0000000480)="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", 0x1000}, {&(0x7f00000001c0)="dd1d62829300ac7195d5f2da84f39a25d6a8b3c4160bddefdc0686d8004d73a399778901405983ab884cc6e2179a7ceae4e3499baaed99da7601f7b73bfa2c1f34b7e5ddb535a2d57d2f0ea658c4b03f", 0x50}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000000280)="56f5e2f1dd0606cab5e247c9e2bdb397d65291d2b7b59938469791cece8ae99ccf6b378f3b9c922e550536f9e09b4e047ea938d2877f658d562f4640b26fc842931faa5a", 0x44}, {&(0x7f0000002480)="dab46037d7eb62e44baa54a998f97c5019d43fdc390bdfe467d41594361e1e38aa3a8658156a9ca9a6101f5132f2b33d7728215a35f70d188e8998928181b00e", 0x40}], 0x5, &(0x7f0000002540)=ANY=[@ANYBLOB="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"], 0x1a0}}, {{&(0x7f0000002700)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000002d40)=[{&(0x7f0000002740)="becbb55eaf41b25847d76c10ec558df7744cc4b0c14246e90474bfcbc447d21c8072740729fb9c2ce4aad704f9e129dc32a3f8b36dde4326bf17cac3b442abbe5ed67b0918afbc18db65ca60cb02cd7b907a8f6a29adf4deadd5a146dec517ccf34e4ad401d2287021a094b6854c054d734f25cc1d42a217621d3cc333e39d82d9ee4b3d2583fa07b111cdc99576b77633be84c0a0367fd0fa61182b0bde36a255dcc89910bd3c4441e8a5d9c811e4ebfb26", 0xb2}, {&(0x7f0000002800)="e8bbee065d6bf7f183c764c3e775b87f9d4457a235af9445f9edd8428391785531f33aaabf8aa346ee883282ab9f1c7d8768e92451fb9e791f6f39fd14db967edc6dfcb5ab6e841f7371f013d61c6dd3de0e6c2ddc4b221f69ae9ac58d8534ae4d86c855855a9aedc7499b7cca763f4dfda6b33bceea576afa76f9454fd11587c0fdfa3f64df04f6addab148697409038d70328512ea0d02bcb40d080ea5cdd2a54fabeeabaab3aa905c2c8232a2258a21ee9f0d4b80f90c2c03d18819b72c2b7a0049ac3d4f4456224d1832ca34fe36d3a745", 0xd3}, {&(0x7f0000002900)="898c00646cf7175119b1747da21e79057d063e4e7c6c65a19a22b015cb88a470720b4897e85afb87968c86ff418bf3ef48a644fdb4ab3aec8cedaa99696287fd2fe91819186f2658987bae63f3402121d1a223332f0ce84f881bec20756e6ef65344b22646c27280d600ac5eb4e65709ed303229e27416c0a2f638", 0x7b}, {&(0x7f0000002980)="1e1359b902b4a857f733ae28893232215bf3c1fa408246954ae3df8476f9b0ebeeaa7c520e21c81743ba1f2f84fce2654e75798a60d747417ec5454c8ec47a6bebfa46c47045ac455196401c08a6ef", 0x4f}, {&(0x7f0000002a00)="3480cc6e72d8bd6c540e85fd96825bbc97093888d07846e26468d10bf213cd174440df488444fc20e127c7a7e5f48442482680fe7fbb2a7da1dc79fa675cb1a52fcb37bec242732069c96e8c5808e8dad180d3b9def7fcd0cb48168fc2a12aeb4e3722158b36a5cf8968b5f621e11faa7494ac927004d1060acf8fc1fb879f4b3013869af206bb637e1c75b614040deab747599967ed90a8efbe9abd1bd6869901", 0xa1}, {&(0x7f0000002ac0)="7c228a0b91933df1a09d8c31d1fe151e2408eda7938bb127f31aba1504dd81677890ccafb24c6ce1d468d1f038bbe719c4ca26c3381177b0a36f7592f06bdb41a373b66038a7986d203461ecef99fa9ad45c1d1444", 0x55}, {&(0x7f0000002b40)="7a25d96f19b93661588361be691e2a75d4cbba87c19e2e6634ff5df11ba2944d531cdcf5aa5e52d4049aee8530620f8446c1fd25823fb6d88ed41511a7a225c2e649d38939f5003146e82f33812e4dac7f7a47bea7ec8044c6d1e840f30e18197b04b29c8461dcff3c119a225aec37b59d0e2223f87b3bf49ea4edd2fb0369fea35f30640197e1c4c43a38", 0x8b}, {&(0x7f0000002c00)="77d4a8dd0229d73178f3920a57d415f29917d48e0a8bf0f696d606cc8e2acba0d36646bf47f8a44ac963af77aa219817937f7c938cd4d815fbcac95ef57a943d241b897b17eaff1df699d79ee8652b61af5f21f58aa2925bee1625ad19aede2531ec1e1266c9d7a392210315f48d61e4054c53783d4f1d22c2dc0feb1cc00b7c0e77db983932291c6edfb84fb610e6f3505d972fbf7c81022075fb7fe33d75919b453842c75948b87f1beb47550eb5b45ef2ea953777afe217fe1a0c9a5a5e36669f2dd143194ea93bad76977e70508ad53c1be41c7b3f735bf21d833d3d", 0xde}, {&(0x7f0000002d00)="af9bd7c149a5bde9ad7882f3", 0xc}], 0x9, &(0x7f00000035c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_retopts={{0x28, 0x0, 0x7, {[@ssrr={0x89, 0xb, 0x2, [@multicast2, @empty]}, @end, @ssrr={0x89, 0xb, 0x4, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @rand_addr=0x2, @rand_addr=0x400}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x607b}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}], 0xe8}}, {{&(0x7f00000036c0)={0x2, 0x4e23, @rand_addr=0x3}, 0x10, &(0x7f0000004b00)=[{&(0x7f0000003700)="c523fa238fa2a78db64d217e274b812610a97dec5a3721de7c18c1e0c506415dd3840a9330d856e88f7bffa908d66bdd196dda8ff27b7559dfe3c65fcc78cc6ba8f891ee48670823609ab03eebc690a8a71ab052944ead6c701e859198c6b1da6f8cb2db4ab0223908fa63575978192a1e7554b60c1e451ed0b69cfbf7d259ed3de9c4ec856824f746aa97cda42a94a3106cbbfdf987274337f34cb11491003f984a4a6ca6076ba2dec1f8a8fca5529e7977794af3f767", 0xb7}, {&(0x7f00000037c0)="b8eb526ebbd13780c2fc2292e121a940e0280d0a9e50b2c6b6a886ed", 0x1c}, {&(0x7f0000003800)="b41d523976b4822549fc0a46db7726ee6fd92d7da880ad5a06445c8558eb2aca0cb3f61b500bb2532680419258d0214180d960511b78ab5b5744fe39832f0972bb9a75f6649a9f49d3868cd777f72d5b8b8f9d79fe396a7a4263c3e3e7e93ddbdfd897d9c753ecdf39e2d50fd5b8ebea7b28ffa193d2142427137c359d76bdd8be8c9ad3223d3f8bbe18ca5e2ea80ba3d7beb262dce0ff84aa392973c8", 0x9d}, {&(0x7f00000038c0)="de367f3b75f3589d7967713a4a5b9496dc6538d2b81bfeaa27963c6e7966af233dd46038ca91f87bd42cf499be552106e2423fd9b60a8bc12dacca5b5ee1175ab6a129027fd747ae69b2b04f1eb9059ad90ed7a8bb4ac795e7f490febfec5403d9d6e899b8a0ce18111b50fece213907ab697eee77781d07cdb5cba5abdbc14aed8f7b5644f17f3313f0e4ef86bf6dcbe1d01725fb91f59e497b84f7e8603d9b24cd9d06fd8375fe5465888d5b0850a748618455a074e8d289ba6c896a2743ebff8e20", 0xc3}, {&(0x7f00000039c0)="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", 0x1000}, {&(0x7f00000049c0)="9c2dda9f096043b4a00749ad7d8cb558714f18d28a6fa12f693b81e69334722b7488e85f050dbaf54d6e8239ca11dc502c5f89201c0d697ac88930ade923b39facc68aaeb865e9e430792d0f0f7c45a360fbf44dd1804ef1d3573784e4f7e95a8c1cde6245882fdd", 0x68}, {&(0x7f0000004a40)="4e17f502fa2acf706aa4bc58fef2ea55138ffc4103971a1865edbe8d7b8d2666917385d5ec2bbd5a24c147d2b536a18f92dac8436afd4ead7aaaedf47580f7180ff500cbf3b5a9e131560b24dfc6b712b5bf0971258846ca13cec2f59f835ebbc339cbb5e46a4d791195ef9355e5f021fe7c095b4d80c4c8bf198c124d7f7b293e41e02db8a0e9469bfef4ab33f94ebceb37b7df3a7ef55e0930cfca8d2e3cc6480dc1bc6ecccb9c98416a2d875813c93d0fe5520e91b3c84eb4401a621501", 0xbf}], 0x7, &(0x7f0000004c00)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @loopback, @dev={0xac, 0x14, 0x14, 0x23}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffffffffff1a9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfb}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xbadc}}], 0x98}}], 0x3, 0x40800) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000003040)={0xb0, 0x4, 0x2e, 0x0, "b454c6d6942758413fa42d1ea3cf740d2c001adb647be5401ba57abd3788810f"}) ioctl$PPPIOCSMRU1(r4, 0x40047452, &(0x7f0000000080)=0x9183) 04:04:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40, 0x10) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x1b) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) sendmsg$inet6(r1, &(0x7f00000009c0)={&(0x7f00000000c0)={0xa, 0x4e20, 0xb4ba, @rand_addr="de7f1b801fcbde8cfaf41c319e92c040", 0x6}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000180)="dce6514374", 0x5}, {&(0x7f0000000240)="05dfb24afe5be47dacfbb53ad0b796c8ca920067e526656f6ace4b077c478c09ddf0015aef0cf9b95c38dc6af104074c878e316a1eada89d102b52228cc248ae0bab3ba80ee62c245e637f884c703ce3f45d7442681ce2d8519917ae8b42a61b", 0x60}, {&(0x7f0000000340)="78030f9ac9452dcfef61eea5275c71371e8f62d73c371ca1a2832eefedac9a590b02e3b0cd5af8b94c0698a741bc1f355d772479f6af09153ba958a2d71c38c3c2ca5c9973beea71d1d9387fe9ddc770dfbaf8fce74ec88b5b9eee540d5da99a3b6b942291614a6b7932352ff044ec52604e0d053a881f7c097ee3b635624ee7daa9bd6577b1d24bdba4c38f954ab896e55a77c0d787d2f596a1730bd8dcacc8ea5785d500bda7d63e06d9c44b7233f6bee1", 0xb2}, {&(0x7f00000002c0)}, {&(0x7f0000000400)="fcff2f09bed4c23aac4c0eb18001abb1a0782b267bc243767fd71fc57cc8ac742a7372bc71e408b40d613cf27a8ba076c701e814e4a7f69986065a9e78e6c63a96d9d97bcec9121ca21b5116847cadc3365bf0e45a3b86855eff21c386872d984f508447daf9f0e54c88da7cf4a50d123958d79c79774205f5e7d7cd90b3a7fac78a61c52a4468aa5e", 0x89}, {&(0x7f00000004c0)="c6e69cffbcab808ccf9ab9508c4e001ecac965454262e18358b855560d256326a09d846d37aac1e93026342d0e315cd3f58bd0f2a77f31a079aaf0036698e812f895df15d9116aa110affef88bbcc54242a120f5", 0x54}, {&(0x7f0000000540)="16c02ed64c7649f805f790f2", 0xc}], 0x7, &(0x7f0000000740)=[@rthdr_2292={{0x38, 0x29, 0x39, {0x0, 0x4, 0x3, 0x5, 0x0, [@remote, @local]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xfffffffffffffffc}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0xff, 0x3, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @jumbo, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1, r2}}}, @hopopts_2292={{0x28, 0x29, 0x36, {0x7f, 0x1, [], [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @pad1, @pad1]}}}, @rthdr={{0x38, 0x29, 0x39, {0x3c, 0x4, 0x0, 0x100000001, 0x0, [@mcast1, @ipv4={[], [], @remote}]}}}, @hopopts={{0x28, 0x29, 0x36, {0x3a, 0x1, [], [@ra={0x5, 0x2, 0x1ff}, @ra, @enc_lim={0x4, 0x1, 0x9}]}}}, @hopopts={{0xc0, 0x29, 0x36, {0x3f, 0x14, [], [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @pad1, @ra={0x5, 0x2, 0x2}, @calipso={0x7, 0x40, {0x3, 0xe, 0x100000000, 0x3, [0x2, 0x7, 0x1, 0x7, 0x54, 0x4, 0x9]}}, @pad1, @calipso={0x7, 0x50, {0x3, 0x12, 0x7, 0x6, [0x8, 0x80, 0x9, 0x0, 0x81c3, 0x6, 0xfffffffffffffff9, 0x20, 0x31f4]}}]}}}, @rthdr={{0x58, 0x29, 0x39, {0x2f, 0x8, 0x0, 0x5, 0x0, [@rand_addr="888e988d258a4f0ca4da97b1bb55150c", @mcast1, @local, @local]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}], 0x260}, 0x4000040) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x266, 0x40000000000000, 0x10004, {0x7fff}}, 0x39) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0x40, 0x0) ioctl$VT_RELDISP(r1, 0x5605) pipe2(&(0x7f0000000280), 0x4000) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000140)='./file1\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:ksm_device_t:s0\x00', 0x22, 0x3) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000240)) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) request_key(&(0x7f0000000300)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\',trusted\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000100)='user\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f00000002c0)='^\xaa\xb7&DM&\x05e\x0f\xa58\xa9J- \xcc$', r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$unix(r0, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r3 = getpgrp(0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r3, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xfffffffffffffc71) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r4, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) tgkill(r3, r3, 0x24) 04:04:31 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000440)={0x2, 0x80000001}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpgrp(0x0) write$cgroup_pid(r2, &(0x7f0000000180)=r3, 0x12) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000480), &(0x7f0000000500)=0x68) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x8, 0x1}}, 0x30) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x5c, r4, 0xf00, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xb}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x80000001}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffd}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc000) 04:04:31 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/mcfilter6\x00') setsockopt$inet6_opts(r2, 0x29, 0x5482853e052a3d5a, &(0x7f00000000c0)=@hopopts={0x6c, 0x6, [], [@padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x7}, @ra={0x5, 0x2, 0x100000001}, @hao={0xc9, 0x10, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, @jumbo={0xc2, 0x4, 0x8}, @ra={0x5, 0x2, 0x81}, @padn={0x1, 0x2, [0x0, 0x0]}]}, 0xf4) 04:04:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75707f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl(r0, 0x100000001, &(0x7f0000000080)="519190e7a52a78e102cfaf3cfbbfecf1456bd0797fc7021427d9cf762707bf72dcd5e80ca75a0652b7c6443e121fdfd8c65f0167c63fbf82dd7798fe10c206200266725654b1a315ae49deacdb6b96e67ed82c54f898b572ed1c42756541f98b19b46e565ed58faef5a9d8e67fd04a") pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r3, &(0x7f0000000100)={0x28, 0x2, 0x0, {0x3, 0x3ff, 0x2}}, 0x28) 04:04:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 04:04:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x402) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000100)=""/44) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x325, 0x5, 0x0, {0x40000000, 0x1, 0x10000000000, 0x2000000000}}, 0x30) 04:04:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) personality(0x400000a) sendfile(r0, r0, 0x0, 0x8800000) 04:04:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,uses_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1, 0x4}}, 0x30) 04:04:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 04:04:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r1 = dup2(r0, r0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4) sendfile(r0, r0, 0x0, 0x8800000) sendmmsg$sock(r1, &(0x7f0000002040)=[{{&(0x7f0000000200)=@generic={0x10, "1f50b3962441816bb2465a0626284ef2a57ed159e8276360d7a8bfbd3702e17ce79195f7128d9ffaead28f1f262cbb45077d5857cc5403b77b512e81ae4e3dcf26f2f104d91d9c3a473bb780cc939460670a81f92faf7a6838e4a2104eb27040987715a84471f096b3ffd789c80382aa64f323c0db4769b195cb0ff3f63c"}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000040)="e94f5cf3ae93a74c14a4c70a2933c5a4e8bfdee0dfb3799f0a3fb468d6f5b1928d87fd073e45cf4671ac4bab826363776cd5fa6b", 0x34}, {&(0x7f0000000280)="15e74547d9206d97254996c102758ada221721f23d5aacf5cb315555f022327b68a553b04f20eaac25102bc60003db620387ae93737495b6fc67d0182dd31f57c4ae412368aff39572ba2c78890cdbce60b736032e6ae09395cbbacd09dd76cdb76ffaec879745ec4003e72e8f426b6042af17b5d051c83ba8003bd7cadacf223dd4bc1970e5f69786f71255d7f6aac20323ec0d27d703cafe143fb4b94b592f3e0e11643e4ae4d83ee0d263f99eab891fae8ee2c0ada459347c9acada6a5d5b52db64e57130aa1911baade5c718b511eb8f733a1a24d6", 0xd7}, {&(0x7f00000000c0)="93597eddec24219a7fb8bf07cac6d3bf1b1d73ab2876c6e590aaf3c4198d325feee94b5802f1a603eff12f073a514e0dd1e4c398db46e08161f242739d3736", 0x3f}, {&(0x7f0000000140)="f792d3702ba604d1d709dd534a325e61f2864d3517f85c03096b611622bb6399c4da4e67463b13881c4c72f2d3e7ffef", 0x30}, {&(0x7f0000000380)="291b57ff6d56dadb3a8cfaa225c00268f8fec492d6318eb11e965c04ac2d49437ff8c4d1bcebd398b18fbae5cd709c8bf183097150152c93fe4cd1b7974e87bb1e0d1a14dd603dcb116ea475df57cf0885a9cad5a1574627b6612356c11f6c92b43565365f57e3c9b631260836c4d0466b4757b0705ea73e3951460a3ac4c43cec7b79071f2b78ad0270dd0eb19c4269e39299ddb1094017c858f55d2f94c618a4a5ee2e131826124bbf026f9586ab90cb87159700eb8b3c2f3676d0de7fff58da7b6e07729b94fa5e122a553b955864eb3ad6be4b3188c9d22185b98ddf8a392084cf6e0efa0acf823c0a113f", 0xed}], 0x5}}, {{&(0x7f0000000500)=@nl=@kern={0x10, 0x0, 0x0, 0x4200000}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000580)="0aaa95d8f286bf0a7fafe95fa8e26bc1f6d80211609fd88dc372008423bca59b4bdd8b0f1fb6d031dd837c4febb1f4cf60c5ab244c7520dcd680bdc2bb80e5d14cfe8e79329de5c4aae390651deae46b6ede80cd4e3d7c8d54d33dcc9b1cfeeb329d683de0cd030c38dabd821cf05f9f963949232f51bdf79cd009b9185498782f31891b5f0c81c227e2e73a8c1ed51594e77ac037937805211034fa8233e5a747056d067fa604880c0a15dc97a9177bedf557b2b6526c5efdfe512c926568343235b07915f858ad8fe570acd040ab48dd5baab6df5478a2", 0xd8}, {&(0x7f0000000680)="18c00f1c534b6a4f7aae10", 0xb}, {&(0x7f00000006c0)="dbe611b4de386acb", 0x8}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001700)="cd2de8799534d4154ca58d99d47bbfb19a2a1df47a437e45477a983af68c0c20cde240ae0183dd86a61b5d06d623f3e1404d5725ad10d62f0ad127dcaa26c746a343878e1cef87594e396cb3398ac9db7a68d935872933890c820d7360b51f9b16786de408c04ec059848b796450f3fb3af80028c65779094ec8c00fb89665feb3e11821145fe1185edba5970fac76c38a28885e9dd903b4f116df038f2cf3f2", 0xa0}, {&(0x7f00000017c0)="b2a2672b884be20ed53c672da138675cff82b217d59d3d67b3aaee0e1f0a2d73ca062b4e044c90f8839fc7f2e9ff41780e64b31ffed8f08406799c82a9f0db7454f683d518f3ad4bf81af088c6433ba5b9d50d6fe0c1da463800b03a4c5729e8f1cdd0896e827e1a40e9b23ffcb065022cf51c7e4a00255439eaa812ac72a04e658397f6e400232e5466ce0f77235257bea3fd99cec8b61ee5efa70e4f61963c6c67952941274751686606b56f2e09bde2f04ff65de9a657a0b96d72f989022bef808a2282f11b0ee4de35107a618a44c4e7d6ee9cdd0a8773ffe344771c", 0xde}, {&(0x7f00000018c0)="bc9c835ff8f8d0da3a8112949b056c95501ab9fd4dabe11c389458b7e614c49be1dbbc43ac5661bbd6e002c07100b5756dfe03e5cfe7fdfdd3dfd588d331e59d211bd992d6ae5b809ff3cdad98a9fc5293677077e5a2f8da8ed96eca0ff41a76a10d6f821ef4b9ca70d8087c7857ac58fcd7777616f63be5911afc390e0aec8252b80fd5b6783a0a18cfff88d05f88326dfa6efd9e2595078dec7bc73474826bfae71e6864d99554e869833fa0b1d3ad9a49ed678b6e13987b6e5b10cee172262678cbba369758ce05d43f3f9e9b0698f28a87d8c3f23ca537baa7829d17835216", 0xe1}], 0x7, &(0x7f0000001a40)=[@txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0xf63}}, @mark={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x8375}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0xdf02}}, @mark={{0x14, 0x1, 0x24, 0xfffffffffffff4b8}}], 0xa8}}, {{&(0x7f0000001b00)=@llc={0x1a, 0x110, 0xc00, 0x4, 0x3, 0x67fe, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001b80)="38dee4be36bcbf5c6a5b60624ec7da0f80d359acf49a2528", 0x18}, {&(0x7f0000001bc0)="141705f2808fb1cb10b1747fce538b3a0887059cf8f39852b84fa4c16099fdf848f764ca1eb9560a4ec0275fc25824cb774cbfbc35a06a0a6f356a8dad121d2be4f826ee0ab643298e5dbcffbb8d96a934ce7fd57a09ad82e71e1ae5f759e9df0ff06b13741a1505ca316f62e115d6662d8804349e4c749a483496588d957ccf597e3f209668868dd3697cf80a56dd32255777b757e89f44786f940f656857b02ad32e2591ad720c7a3c29e2d08e2bdebcd37f63792fb461dc43e19325", 0xbd}, {&(0x7f0000001c80)="ff05a542261b01e0c57b1cd4f3d582883b82b672f6bf950484d87b355dae8d", 0x1f}, {&(0x7f0000001cc0)="19faf9d54bafcad5e79755e4d49da8f78170dea37da2cc9525589c67f1ce5f45933ef648b8b5164878fa1d202b71f895299a8d86fc461b2b6a71cd7a35a8729cdfbc820db73334930ce86db7fbb9cf29fa243b1e6fcc784dc30d2fa956229e5621478f6686082b8a0ffc645b6e9ecad7c5d487b3b395bcf6cd33e45d8671380d3c4ae56e242423f4", 0x88}, {&(0x7f0000001d80)="ec12b450", 0x4}, {&(0x7f0000001dc0)="8bccc76d02a1a8e578d850bcf847853d43a838f7ed01436b0f05cf86e8287ec8f0f5f0b9faced7799630ebe4bf11d33eebcc6a0b3e5f8dfd743efeac9893576ec642811fa6c42a916d3ea1c3592a2e90315ba2da88550f9cc9bca4a424d345e4e0c1219ad24f03f598e61128bff62a380f0d42e81a493dbe39d4edb97690a8261ea0ccf1e2c8a55294df3ad90e944d5fcd81dcc3eb91f1b911d6774f65520a180369a69ea8a915062b3df6a672fb5ddf72af1b85cbf39f72a887d8504f730bb2dc425703f848f8d5ae2781bc2bc5a6135d1a032d03340d20778a0ab871653031c763bf32fdc6af", 0xe7}], 0x6, &(0x7f0000001f40)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x3c}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x7fffffff}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0xf79}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}], 0xd8}}], 0x3, 0x24000000) 04:04:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r1, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xfffffe05) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r2, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) 04:04:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffff9c, 0x0, 0xe, &(0x7f00000000c0)='nodevsecurity\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0x1, 0x3, 0x1, 0x8, 0x0, 0x3966, 0x10, 0x1, 0x6, 0x10000, 0x2d, 0x7f5, 0x3, 0x40, 0x5, 0x40, 0x400, 0x2, 0x0, 0xff, 0xfffffffffffffffd, 0x0, 0x81, 0x662c, 0x9, 0x100000001, 0x6, 0xffff, 0xbf, 0x55ddfc3b, 0x7, 0x7, 0x81, 0x100000001, 0x10001, 0x7, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x20021, 0x27d3e764, 0x2, 0x0, 0xf20, 0x26}, r1, 0x2, 0xffffffffffffffff, 0x3) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x606e, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000000c0)="2dd920b33fe74e", 0x7, 0xfffffffffffffffc) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000080)={0x20, 0xfffffffffffffff5, 0x8, {0x0, 0x11}}, 0x20) r2 = add_key(&(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="5fcddca6f5eb0f1fad9c31458cfd2364f4db4c674ff4034f480d4b7618378036ad8120af51ba57af59a2279184178da5b539d390ac472e0cab75e1bfbdf7ad8df7c78f82e2b906cc241605e7f677540a953033044a6c1ac57d09dbaec6", 0x5d, 0xfffffffffffffffb) keyctl$reject(0x13, r1, 0x7, 0x400, r2) 04:04:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 04:04:32 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2742, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0xfffffffffffffeff, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 04:04:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = getpid() perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x7fff, 0xf5a0, 0xe7, 0x3, 0x0, 0x6, 0x40000, 0x9, 0x0, 0x92f, 0x4, 0x4, 0x443f, 0x0, 0x2, 0x100, 0x0, 0x3, 0x3, 0x4, 0xff, 0x7, 0x4f, 0x800, 0x2, 0xf9, 0x1, 0x7fffffff, 0x1, 0xffffffffffffffff, 0xe586, 0x2, 0xff, 0x3800000000, 0x8, 0x3, 0x0, 0x94, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x2000, 0x1e, 0x5, 0x0, 0x0, 0x9ec, 0xfffffffffffffff7}, r1, 0x7, r0, 0x8) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = getpgrp(0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1ff, 0x0, 0x1f, 0x40000000000000, 0x0, 0x0, 0xfffffffffffff800, 0x24e, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd85, 0x5, @perf_config_ext={0x0, 0xffffffffffffff01}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20000000000000, 0x2}, r3, 0x7, 0xffffffffffffff9c, 0xa) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) fcntl$setflags(r4, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) [ 859.325417] INFO: task syz-executor.1:5341 blocked for more than 140 seconds. [ 859.332823] Not tainted 4.9.184+ #5 [ 859.337002] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 859.345081] syz-executor.1 D25544 5341 1 0x00000004 [ 859.351023] 0000000000000087 ffff8801c9dbaf80 ffff8801cfd9e300 ffff8801db721000 [ 859.359251] ffff8801cfdc97c0 ffff8801db721018 ffff8801ccab7598 ffffffff8280a5ce [ 859.367596] ffffffff82e2e020 ffffffff8120b8c0 00ffffff83c82a40 ffff8801db7218f0 [ 859.375920] Call Trace: [ 859.378659] [<000000001ea95746>] ? __schedule+0x6ce/0x1f10 [ 859.384410] [<00000000d63f9187>] ? trace_hardirqs_on+0x10/0x10 [ 859.390622] [<0000000002cfaf93>] ? io_schedule_timeout+0x390/0x390 [ 859.397491] [<00000000765814bd>] ? mark_held_locks+0xb1/0x100 [ 859.403498] [<00000000cea06abd>] schedule+0x92/0x1c0 [ 859.408844] [<0000000035e4d706>] schedule_preempt_disabled+0x13/0x20 [ 859.415483] [<00000000a3301c17>] mutex_lock_nested+0x38d/0x920 [ 859.421615] [<00000000f3d664c6>] ? fuse_lock_inode+0xad/0xe0 [ 859.427583] [<000000006968b728>] ? mutex_trylock+0x3f0/0x3f0 [ 859.433672] [<000000003cf68080>] ? d_alloc_parallel+0x82c/0x1720 [ 859.439994] [<00000000f3d664c6>] fuse_lock_inode+0xad/0xe0 [ 859.445806] [<00000000ffc05149>] fuse_lookup+0x89/0x3b0 [ 859.451292] [<00000000f5707a50>] ? fuse_lookup_name+0x640/0x640 [ 859.457631] [<00000000fff5d57f>] ? __d_lookup_rcu+0x630/0x630 [ 859.463803] [<0000000095bb605d>] ? lookup_slow+0x160/0x480 [ 859.469592] [<0000000055b59ebb>] lookup_slow+0x24b/0x480 [ 859.475270] [<00000000645e7a4e>] ? avc_has_perm_noaudit+0x9e/0x300 [ 859.481755] [<000000006f25bae2>] ? set_root+0x430/0x430 [ 859.487269] [<000000007c3e1cc2>] ? __might_sleep+0x95/0x1a0 [ 859.493254] [<00000000ba5606bf>] ? selinux_inode_permission+0x32d/0x4c0 [ 859.500286] [<00000000d63b8259>] ? audit_inode_permission+0x320/0x320 [ 859.507019] [<000000002afdf2b6>] walk_component+0x71e/0xce0 [ 859.512895] [<00000000a059a66f>] ? follow_dotdot+0x200/0x200 [ 859.518879] [<000000008f30e31e>] ? security_inode_permission+0xc5/0x100 [ 859.526127] [<00000000e320699e>] ? fuse_allow_current_process.part.0+0x270/0x270 [ 859.533896] [<00000000ac554150>] ? __inode_permission2+0x9e/0x2e0 [ 859.540292] [<0000000033735ecc>] link_path_walk+0x897/0x1200 [ 859.546276] [<00000000a4ae949d>] ? walk_component+0xce0/0xce0 [ 859.552282] [<00000000eb6020a1>] ? nd_jump_root+0x1c4/0x3b0 [ 859.558189] [<00000000da1a9288>] ? trailing_symlink+0x261/0x790 [ 859.564516] [<00000000b7bd0081>] path_mountpoint+0x67/0x6d0 [ 859.570368] [<0000000098d3308a>] filename_mountpoint+0x17f/0x350 [ 859.576702] [<00000000ac0b2ace>] ? user_path_at_empty+0x50/0x50 [ 859.582977] [<0000000090405525>] ? __check_object_size+0x252/0x38c [ 859.589455] [<000000007dc0fcf4>] ? strncpy_from_user+0x194/0x240 [ 859.595760] [<00000000a7303d34>] ? getname_flags+0x232/0x550 [ 859.601702] [<00000000bf72fa76>] user_path_mountpoint_at+0x3a/0x50 [ 859.608177] [<000000009df852a8>] SyS_umount+0x136/0xd30 [ 859.613738] [<000000006114e345>] ? SyS_getdents+0x1c5/0x2b0 [ 859.619700] [<000000006caeea32>] ? SyS_old_readdir+0x160/0x160 [ 859.625818] [<00000000c653eff3>] ? __detach_mounts+0x2f0/0x2f0 [ 859.631955] [<00000000e314c889>] ? do_syscall_64+0x4a/0x5c0 [ 859.637842] [<00000000c653eff3>] ? __detach_mounts+0x2f0/0x2f0 [ 859.644097] [<000000006c209850>] do_syscall_64+0x1ad/0x5c0 [ 859.649910] [<00000000bca3704f>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 859.657239] [ 859.657239] Showing all locks held in the system: [ 859.663647] 2 locks held by khungtaskd/24: [ 859.667962] #0: (rcu_read_lock){......}, at: [<00000000cfdfe9fd>] watchdog+0x14b/0xaf0 [ 859.676997] #1: (tasklist_lock){.+.+..}, at: [<00000000f701a97f>] debug_show_all_locks+0x7f/0x21f [ 859.686774] 2 locks held by rs:main Q:Reg/1892: [ 859.691426] #0: (&f->f_pos_lock){+.+.+.}, at: [<00000000ea8d3750>] __fdget_pos+0xa8/0xd0 [ 859.700383] #1: (sb_writers#4){.+.+.+}, at: [<00000000c1db723f>] vfs_write+0x3e9/0x520 [ 859.709339] 2 locks held by getty/2022: [ 859.713298] #0: (&tty->ldisc_sem){++++++}, at: [<00000000813c196a>] ldsem_down_read+0x33/0x40 [ 859.722861] #1: (&ldata->atomic_read_lock){+.+...}, at: [<000000004b780521>] n_tty_read+0x1fe/0x1820 [ 859.732891] 2 locks held by syz-executor.1/5341: [ 859.737658] #0: (&type->i_mutex_dir_key#7){++++++}, at: [<0000000095bb605d>] lookup_slow+0x160/0x480 [ 859.747748] #1: (&fi->mutex){+.+.+.}, at: [<00000000f3d664c6>] fuse_lock_inode+0xad/0xe0 [ 859.756728] 2 locks held by syz-executor.1/12055: [ 859.761551] #0: (&type->i_mutex_dir_key#7){++++++}, at: [<0000000095bb605d>] lookup_slow+0x160/0x480 [ 859.771628] #1: (&fi->mutex){+.+.+.}, at: [<00000000f3d664c6>] fuse_lock_inode+0xad/0xe0 [ 859.780551] [ 859.782161] ============================================= [ 859.782161] [ 859.789651] NMI backtrace for cpu 0 [ 859.793356] CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.184+ #5 [ 859.799746] ffff8801d98d7cc8 ffffffff81b580a1 0000000000000000 0000000000000000 [ 859.807851] 0000000000000000 ffffffff81099a01 dffffc0000000000 ffff8801d98d7d00 [ 859.815852] ffffffff81b6333c 0000000000000000 0000000000000000 0000000000000000 [ 859.823924] Call Trace: [ 859.826492] [<00000000314be661>] dump_stack+0xc1/0x120 [ 859.831838] [<00000000b0988f34>] ? irq_force_complete_move+0x2e1/0x300 [ 859.838576] [<00000000c72d8eec>] nmi_cpu_backtrace.cold+0x47/0x87 [ 859.844874] [<000000007475fc7c>] ? irq_force_complete_move+0x300/0x300 [ 859.851612] [<00000000389ca78a>] nmi_trigger_cpumask_backtrace+0x124/0x155 [ 859.858695] [<00000000807e2c25>] arch_trigger_cpumask_backtrace+0x14/0x20 [ 859.865803] [<000000005bcb35d7>] watchdog+0x670/0xaf0 [ 859.871120] [<00000000cfdfe9fd>] ? watchdog+0x14b/0xaf0 [ 859.876601] [<00000000e1aaea28>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 859.883474] [<0000000003d207d2>] ? hungtask_pm_notify+0x60/0x60 [ 859.889605] [<00000000776f42f5>] kthread+0x278/0x310 [ 859.894777] [<00000000ba2c6066>] ? kthread_park+0xa0/0xa0 [ 859.900386] [<000000002b26dc9e>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 859.907154] [<00000000666f402c>] ? _raw_spin_unlock_irq+0x39/0x60 [ 859.913464] [<00000000aef1f652>] ? finish_task_switch+0x1e5/0x660 [ 859.919962] [<00000000275a229b>] ? finish_task_switch+0x1b7/0x660 [ 859.926264] [<0000000015aafeea>] ? __switch_to_asm+0x41/0x70 [ 859.932226] [<00000000036afd0c>] ? __switch_to_asm+0x35/0x70 [ 859.938139] [<0000000015aafeea>] ? __switch_to_asm+0x41/0x70 [ 859.944009] [<00000000ba2c6066>] ? kthread_park+0xa0/0xa0 [ 859.949620] [<00000000ba2c6066>] ? kthread_park+0xa0/0xa0 [ 859.955265] [<0000000098f1facb>] ret_from_fork+0x5c/0x70 [ 859.960918] Sending NMI from CPU 0 to CPUs 1: [ 859.965501] NMI backtrace for cpu 1 skipped: idling at pc 0xffffffff82819721 [ 859.972851] Kernel panic - not syncing: hung_task: blocked tasks [ 859.979017] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.184+ #5 [ 859.985426] ffff8801d98d7c60 ffffffff81b580a1 ffff8801c9dbaf00 ffffffff82a7abc0 [ 859.993410] 00000000ffffffff 0000000000000001 dffffc0000000000 ffff8801d98d7d40 [ 860.001467] ffffffff813fd67a 0000000041b58ab3 ffffffff82e313da ffffffff813fd4a1 [ 860.009499] Call Trace: [ 860.012075] [<00000000314be661>] dump_stack+0xc1/0x120 [ 860.018025] [<000000001b926a8c>] panic+0x1d9/0x3bd [ 860.023025] [<00000000413ab7c5>] ? add_taint.cold+0x16/0x16 [ 860.028810] [<000000007475fc7c>] ? irq_force_complete_move+0x300/0x300 [ 860.035545] [<00000000aa09b18c>] ? ___preempt_schedule+0x16/0x18 [ 860.041762] [<00000000028faf1f>] ? nmi_trigger_cpumask_backtrace+0x135/0x155 [ 860.049057] [<00000000b623b17e>] ? nmi_trigger_cpumask_backtrace+0x13f/0x155 [ 860.056320] [<00000000ece43c4e>] watchdog+0x681/0xaf0 [ 860.061595] [<00000000cfdfe9fd>] ? watchdog+0x14b/0xaf0 [ 860.067032] [<00000000e1aaea28>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 860.073891] [<0000000003d207d2>] ? hungtask_pm_notify+0x60/0x60 [ 860.080026] [<00000000776f42f5>] kthread+0x278/0x310 [ 860.085197] [<00000000ba2c6066>] ? kthread_park+0xa0/0xa0 [ 860.090804] [<000000002b26dc9e>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 860.097537] [<00000000666f402c>] ? _raw_spin_unlock_irq+0x39/0x60 [ 860.103847] [<00000000aef1f652>] ? finish_task_switch+0x1e5/0x660 [ 860.110237] [<00000000275a229b>] ? finish_task_switch+0x1b7/0x660 [ 860.116544] [<0000000015aafeea>] ? __switch_to_asm+0x41/0x70 [ 860.122415] [<00000000036afd0c>] ? __switch_to_asm+0x35/0x70 [ 860.128279] [<0000000015aafeea>] ? __switch_to_asm+0x41/0x70 [ 860.134146] [<00000000ba2c6066>] ? kthread_park+0xa0/0xa0 [ 860.139749] [<00000000ba2c6066>] ? kthread_park+0xa0/0xa0 [ 860.145356] [<0000000098f1facb>] ret_from_fork+0x5c/0x70 [ 860.151240] Kernel Offset: disabled [ 860.154948] Rebooting in 86400 seconds..