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"}) 10:31:20 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:20 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:20 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:20 executing program 3: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f4360000000000"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "245546e1b57a01fc0b7a2bf349f3ba806c772a2b436327706a3117050605b942ca899b86cc056ef712f787b24f5b94917cce765f2ddb44d30616bc32318a3d6cf1d1097dcfb571e984efb3856f3aa6810394d9bec693630611a624fd2cead37c13b942da855781b9f2267390881810c0c831d0f2991c3671734341bb7d2b15ec06be5ca6e65f89faa61faab4883e69654b73877afd3a392eeeb89dae8b149dbb00dafa792211c194a0bccbf549d196ab3f82d5d6b3b038787dd8f980d42f18f74beb947371dee8db5a1f0b71e6249ca040fdd2b4d66a83c3a9ed828d3447dfb659731a28ed3be3da94d339dca3cb80248428f229bc11f40555866c4524ce0271ab34bece9d19f5a7ae2659bd408c7ddf9a25415fafdadb36864be3ac3aa0f04c9f981dd209e5f641e7d3baff72b0d0f3abff731618ff41afb483d7c2a8a1029bfa255e2aa96fb580c1eef7b5e84f7df0d2dba962afcb9a2a770e36bf93999465e6737dd57e564177b9752b13fd046b8a71052a6203d08080c2d748b7c366a56333168fed684a5d22a35abdbd0ccb65daa03f5e3cc07a89d73d18da38ceb0c1bdceb8afc49dd60b8d2ca6947ce6ce0d655f77b57e2aed0da33feab7f3434cb57df7d8c2e72d957898e4ea007953187763dd870a22c3acf25c3cfc35eab25be8441e7588bf255c693608530856515d4e047df9c9a5cd5a8481cc04d78b347d6f314714516f5fdbb65e874c2bc0128d82f031d35e175cb440fb6fda64c7a90f2c7493c9cfd6d1858dc5c145df55b5948242db084efe95141645802eb1cec1d9cc9e5bb3791eeae916be212f25e6ca5134739f12c13536d0118bbac49495ea6b77a24519bd5fdcb1c8a5a4a30280b34d1900dd119ec039a5c7aba8d17b3219b74635140d8cf76871c793784a8a981258f72231aa75bdc9ad1d6339608dee474a3856aca9bc2ef131640ec7f09d4a737431c552a876755801dd1c3351a4c166b94b201fa2523ad6aba700c9b27a400b540d7dafc8cb5c046406ecdb26a67da469057e21392df1824da6997ce6b1be281bc033b7a5ef85fa5f8b57eea501936bee184fdf7772ebb78fee253e97f9215ccb28afb41dea041f9853333681cc00ef2a85cddbc546d0f544909a1a7a4c4beb46b06c72657da640544837b343d2139c944adbb6f6303b3978efab19ba0b549941fd51c64ddd352fdfef6c458e7449b4cdc2dfa75de15e4e2c78bfb21382d522684b11c786786d39b8e74ff0884f3d20a39ab999fbe3a8a630e7af7e62d1eee2e9aaf1348723a5f6a9217b174f0c323a14f4f14890d41f2d7e2ddf523116763dc53a0b32560c6cfa8c5bdb1cfdb030e307da1838cf7ef4cc997897925f64a2c5d144bd264904550a572c6ad711693ea7b1b841943eb533a66186aa4698e4b2490943a5bd8075ee6b0c24e4b1571f7f6ee9d98eec676a8d5c05ecb7fe8322e862785478c794f69cd9c5322d0ff68b3d6e124820887705189a9831381e37fa1f18678e6254e6e80a7ce8a1cd965065fea6d48acfe2fb25a302a98b518abb992371eb99c7d47f9cfe96bef9bbaff1453fd20973446518bd3d11e53d76b8714e87d737bdf3b306753e138f27e79916da2ce54edcdedb975d49f2c77da894d0dd04d1a3e675c2e7f978bdbd7668de303192c7af8706a5ada50e8f0d6843aa3c36d7836e88930409c60bf03e0ae8a3e7c601e2b4678024efb5e91dc231007e1f7e637efd08b729d790b899944421680d917d590b0659cbb3406dc7d1eaa5b461aa7c979ed3eaeb09fb7fe1c4c5c00bd3862bfc8160f04f7aae671fcf1aecd54ea192f4a0ae2c3762ddc38e3a212008a24488a2ae98731a19cfcc4881c5fbe08a3696927b8ff7e853d3097ca1840c5fc4b49e881de5af9c82d76b5723821db4480e8d1a66084274d2811f038d017af68c4f0412893a783f476a538d84e43853a913a20afbb927614f1ddcd5641973f784713eb25d0498b9f9d66a82a4294262e661c67295bb4f43593d9d9e3bff30eb67e479981c7e9c6bf32333f0ac688f22e984cad4c4004e5382e3d4ed7e79add11f86eaa4464e2ff0e568153768fdbcfb26bce8692dc62f069c5cefa204122289ce5c9e0618b6a1b20d7f37e88044c38339fc746703fd3ae1ee583717e94d01f4c194e4908b901c7ac02829fe0ea318f12249c4f1378c92465ce7a8f37bab36e9857f859aceb8e7fbb557aa5c07d2b37f6d440a59e76bbfbd1f6fd92375eb9d0d4ac9de484abc23369e867a6b024bcaa54376fea8ccc3a32f127042777b083474d3c77d77f3f5f4a9df5fde25ef45fffd1874b17c6701010d35e44419c0b2f42edee781b4531b419e6767b775079d38aaf2a48aa540c0597ea20352532471c093c7e4079bfd649d4a69fd3f47298c89eb848b566532e4531b07f1baf2ea681880682957d44709666610bff4ba2bf4321e1fa65d21623a013566247ba45f4f97d2d652a237460ba1c663e64fb61fada7f366d22d41ed8e7889ac853cf45ee822f3b5ccc324ef0aa2e886fde7447f2cf83d2b991852181e952541cb196708f747ffb8232b7959b7b182fc46046b257c295667e8fd82a386e2be8c6df13ea1283ac111eb9d1660403672fe8c37ab0e1aa0feb7c6607c1c34a82d321e673f31c2579e2c6f737f08bd131ede7990129167dd831666bc1d26202c5787a2ee1847104ea242a1166015da1c1bdc022dc5dfbc927e657579fc444a04947270e358f913fdfc5f902da88bf05cdb560d5a76d5412508a154ff6ea33fd970cb8800cd49a383153b899ddf9faa239b865b7f3ed622bbc1930b33528d6e6bb583ed9559d49eecb7905e59bb26fbf3fb0cd0a61fcea1b17e339dc537f3954ffb0401858bb650980ed8e06b4ac089f96baddf76e95dee0b0b7880a088253d5d25cb5beb65be2dfd17c3163e5ea1480f7b8d56038165c5f26dbca08d593f88bd4edfebe8097e4805f7b206ef16394439ef3dc355718265ac74bd8553a1139a2125ca36a420f9100f61939c57eb0d38af68565b1c76e249b479e8f060aa0c9b046f05876d0cbdc85162029b018ad60d1ce1ae31fff5eafb8fbce64dfafdccd4983b8ab626a2b07cc9dc4843bdc4b96881a31aecdce6a4c4b940735d38fa6b2e206e4c9885d67e09b6f9d01fcbf26398e9b8d0a9adf01248a19c8aed0504e1a1b8597fca753ff0ca519aa915bf876ece0dd21c3b629df60c49de5b1a03997b7f7996fe5e23cb918e3579623b38c29b90e0b8f84449af173f3c1d992e459d2e14a4015d67d16151766e7434cf54e7928ba46ee5bf16165af04b1dbe2137a098a27e759f09fb62d1fd98c9c05ed8d464e14f21342fa207b6253b6ccae048dca4b2cee5747ab8b45aa458614181a942acb683a823b27a234cf14d3bfaabee6f09a25ef0346fc2256d29496c9d1369b961bd1e00b509f29389e71eb94b001ea411b8cba84f9f70a01e25bca1a784635b3e034697c8c16234bd507b81a2a9c0daf96195b3c1822b0ea9fc62e5b0e6dd41b77f4cfee8ddaa163e5b8ccc608c3cf21390ef705bbec2f40061ebe43da04d1adffebc945bac9054fc8349b60f231204d173637f4300945cb0f308a96f89c28e89d75bcfa459d5f90db797d7cd62a9dc027501ab41f81193539b5577a6370de54852af2b5ddda6a8840d37027f6822e256fe40275b7b18eab547a8dc7c17dc5e9b8c9d8a454629c904827bcc668595cb6ab4dc5423baba58584f33134c362a08659e1e7cc5eb6416a266b0d1e1e109cf7f09dc4e030e1739504a09115139098fb8191eeb4737f028ea6097050d2a6ca8421f0bfdec9e1371db8fdfd0c03a1658e94aa7096ca411f205ca997a26fa2676f55f2910cd6ce25b44cdb20e1df995cd12a8caeb0eddf90e575d754ad51190eaddbbee518556ea68df90be8e68611712ff2f729da25ab4adef901dd231389e19ef7839474a814f40d1c65f92f9cde7cb6c53167e6c20e638206a347c07a8832ebdaa46a86829305302c3b067f699540c74eb2dd155eee824dcf438df64ac3bef8600ab2ef6d21d9772d5a8e1173fef91b163d05d62be180ff7ff2604f67fb157de15229ce96911ba5839fcde079f48315c4a6cd4986d69d298946dcc4191d3591c0aa07ce4974cb68c11dae4a136c99c5a2378c20e192572299c68c73389d9a232368ebdf54399c12582295864e5ffd18a9241402c8ea5ca9616fba9b10817ba0bb8301c8424596c975e2bdafcd03dd32d79084cc347902f4c9208adba0c699e707199fe5bd1026638a1c9125e3fcbf2a8fbbba45b78e9734ffe4a098e870628cbcbd7c13c12fbd3d2ac31c4579493dd1c350f0209acb50d914d47023bb9a7e02d0106d800982e8f34834fe562e5ea3aad09a82e8513406faf8e9011f4338b689d635c899018e3e985c7d97680b1c71bed439506db8627191abc8bb7042943c10414e2145df71ac903ffa8958db90e3b2f3ae5c7f6be621e71ef10ca40b07b4aa65ef6adcda901bc6dee0b14034f761cabcb35fd598a3fd1c3c4145a4cc4191f9a9a4bd43d2704dab9d178e4df0fe7752ecfc0d4031e0c9e44a04e90defab1698566e665fbe7e7fd1ac92947dfdb117c582934f607e83bfcd247300dbc069fbddc09c80b5bda81e17a55a459e6c39c22b88e5ce1354cfaedc7d0a7d63dcbe80e12b3f9a7426fe9c4022ecf0a44a4dff07372d443654d04019d6c2758bf7e0b893d4646dc6feb08fada445c65fcd087ba89f7ed15b6f9a685ecaace24f6f3cfc7f59c5b2e846f7b20ff6d1df8730b458b970f00fee445c5d379a2990baf1fcbb693278adf882ac7f9df7a4e8585ebf5af141b924e3443303b33387caf3e10e7cbe575e24ef1261265e22257066495bdef36d42f4b9cb6cdddb1a6ce6fc13f3efd1d57fa2cd07721b2a66ca52b993c55ca826bf7ae925636fbd9dfd56f649167c68b516caa3e15d964d7417f562f262b0db3f23b7ed364b97f9287966bd9b3342d87f8a6198d549ec70dad2cd14385a2fae155cbd625804caa7de21dd7e2c065ce58464c5224cf0d1f6ff0280bbb3c9d72a053f42636e83980dafdd780125b5feaa8a38e5968bfb99c60c9472329fc51380345920924ff1a548de3f21672666ff82b23f548e7b960de27b6bc2d63c2e677c3b141b7a76de2ca1e4977ac7f793411566ed03d10df189780aa67f1a042fce8eca229938c3e385946277c8a3f2dcc22b11af393e662d265be821dde95284b95d58ea367613296c1f472344c3aeffd5a53925dc064809f52a48b1c4f21885b2c40b25ed5b2f8903c6f3223a955dcfd59df657f54a5ad1f39fb8275632872cc960070186268a0334b54e80bbf06aa71d26ba9a00828d421276e9d9b9aba50d0e0f9bdf600a3cd25628b210779955ca53c942c2909fd2a5b067cf6c7fde7ca36949d191a4f71316d52c0be8106066da523d887b8ef0d1de6534a0445b75c23d8b814dd999641a3bb8ce490d70329c9b92e42cb51eee4a5e094aa313dd9da0e88278688052b94e1a628aece8cf9f94cd0f82bbc5984269132e5f8ed54bb515f69a7832bb2368a15e1b604a702266fabcc392e327f987e9438129da28c795ac6e8561a9f30a98d8de8bf0f8da714d264ef413231bc28d7dd52962f116ba7587f7b946a54904105295318f53e96cb6eec3fee53ca92e6007af170b6beb7a9954b8b117472b4b497d5e953717732b374103eb20ce2be0a897a06156dabef6f55c49aa7a69bf53cbff6b1d3cd3c0c5ddaf94ded37f3e9c777c580ccce314da0b5ea2728a78bdb", "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"}) 10:31:21 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f43600000000000000"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) 10:31:21 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f43600000000000000"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "245546e1b57a01fc0b7a2bf349f3ba806c772a2b436327706a3117050605b942ca899b86cc056ef712f787b24f5b94917cce765f2ddb44d30616bc32318a3d6cf1d1097dcfb571e984efb3856f3aa6810394d9bec693630611a624fd2cead37c13b942da855781b9f2267390881810c0c831d0f2991c3671734341bb7d2b15ec06be5ca6e65f89faa61faab4883e69654b73877afd3a392eeeb89dae8b149dbb00dafa792211c194a0bccbf549d196ab3f82d5d6b3b038787dd8f980d42f18f74beb947371dee8db5a1f0b71e6249ca040fdd2b4d66a83c3a9ed828d3447dfb659731a28ed3be3da94d339dca3cb80248428f229bc11f40555866c4524ce0271ab34bece9d19f5a7ae2659bd408c7ddf9a25415fafdadb36864be3ac3aa0f04c9f981dd209e5f641e7d3baff72b0d0f3abff731618ff41afb483d7c2a8a1029bfa255e2aa96fb580c1eef7b5e84f7df0d2dba962afcb9a2a770e36bf93999465e6737dd57e564177b9752b13fd046b8a71052a6203d08080c2d748b7c366a56333168fed684a5d22a35abdbd0ccb65daa03f5e3cc07a89d73d18da38ceb0c1bdceb8afc49dd60b8d2ca6947ce6ce0d655f77b57e2aed0da33feab7f3434cb57df7d8c2e72d957898e4ea007953187763dd870a22c3acf25c3cfc35eab25be8441e7588bf255c693608530856515d4e047df9c9a5cd5a8481cc04d78b347d6f314714516f5fdbb65e874c2bc0128d82f031d35e175cb440fb6fda64c7a90f2c7493c9cfd6d1858dc5c145df55b5948242db084efe95141645802eb1cec1d9cc9e5bb3791eeae916be212f25e6ca5134739f12c13536d0118bbac49495ea6b77a24519bd5fdcb1c8a5a4a30280b34d1900dd119ec039a5c7aba8d17b3219b74635140d8cf76871c793784a8a981258f72231aa75bdc9ad1d6339608dee474a3856aca9bc2ef131640ec7f09d4a737431c552a876755801dd1c3351a4c166b94b201fa2523ad6aba700c9b27a400b540d7dafc8cb5c046406ecdb26a67da469057e21392df1824da6997ce6b1be281bc033b7a5ef85fa5f8b57eea501936bee184fdf7772ebb78fee253e97f9215ccb28afb41dea041f9853333681cc00ef2a85cddbc546d0f544909a1a7a4c4beb46b06c72657da640544837b343d2139c944adbb6f6303b3978efab19ba0b549941fd51c64ddd352fdfef6c458e7449b4cdc2dfa75de15e4e2c78bfb21382d522684b11c786786d39b8e74ff0884f3d20a39ab999fbe3a8a630e7af7e62d1eee2e9aaf1348723a5f6a9217b174f0c323a14f4f14890d41f2d7e2ddf523116763dc53a0b32560c6cfa8c5bdb1cfdb030e307da1838cf7ef4cc997897925f64a2c5d144bd264904550a572c6ad711693ea7b1b841943eb533a66186aa4698e4b2490943a5bd8075ee6b0c24e4b1571f7f6ee9d98eec676a8d5c05ecb7fe8322e862785478c794f69cd9c5322d0ff68b3d6e124820887705189a9831381e37fa1f18678e6254e6e80a7ce8a1cd965065fea6d48acfe2fb25a302a98b518abb992371eb99c7d47f9cfe96bef9bbaff1453fd20973446518bd3d11e53d76b8714e87d737bdf3b306753e138f27e79916da2ce54edcdedb975d49f2c77da894d0dd04d1a3e675c2e7f978bdbd7668de303192c7af8706a5ada50e8f0d6843aa3c36d7836e88930409c60bf03e0ae8a3e7c601e2b4678024efb5e91dc231007e1f7e637efd08b729d790b899944421680d917d590b0659cbb3406dc7d1eaa5b461aa7c979ed3eaeb09fb7fe1c4c5c00bd3862bfc8160f04f7aae671fcf1aecd54ea192f4a0ae2c3762ddc38e3a212008a24488a2ae98731a19cfcc4881c5fbe08a3696927b8ff7e853d3097ca1840c5fc4b49e881de5af9c82d76b5723821db4480e8d1a66084274d2811f038d017af68c4f0412893a783f476a538d84e43853a913a20afbb927614f1ddcd5641973f784713eb25d0498b9f9d66a82a4294262e661c67295bb4f43593d9d9e3bff30eb67e479981c7e9c6bf32333f0ac688f22e984cad4c4004e5382e3d4ed7e79add11f86eaa4464e2ff0e568153768fdbcfb26bce8692dc62f069c5cefa204122289ce5c9e0618b6a1b20d7f37e88044c38339fc746703fd3ae1ee583717e94d01f4c194e4908b901c7ac02829fe0ea318f12249c4f1378c92465ce7a8f37bab36e9857f859aceb8e7fbb557aa5c07d2b37f6d440a59e76bbfbd1f6fd92375eb9d0d4ac9de484abc23369e867a6b024bcaa54376fea8ccc3a32f127042777b083474d3c77d77f3f5f4a9df5fde25ef45fffd1874b17c6701010d35e44419c0b2f42edee781b4531b419e6767b775079d38aaf2a48aa540c0597ea20352532471c093c7e4079bfd649d4a69fd3f47298c89eb848b566532e4531b07f1baf2ea681880682957d44709666610bff4ba2bf4321e1fa65d21623a013566247ba45f4f97d2d652a237460ba1c663e64fb61fada7f366d22d41ed8e7889ac853cf45ee822f3b5ccc324ef0aa2e886fde7447f2cf83d2b991852181e952541cb196708f747ffb8232b7959b7b182fc46046b257c295667e8fd82a386e2be8c6df13ea1283ac111eb9d1660403672fe8c37ab0e1aa0feb7c6607c1c34a82d321e673f31c2579e2c6f737f08bd131ede7990129167dd831666bc1d26202c5787a2ee1847104ea242a1166015da1c1bdc022dc5dfbc927e657579fc444a04947270e358f913fdfc5f902da88bf05cdb560d5a76d5412508a154ff6ea33fd970cb8800cd49a383153b899ddf9faa239b865b7f3ed622bbc1930b33528d6e6bb583ed9559d49eecb7905e59bb26fbf3fb0cd0a61fcea1b17e339dc537f3954ffb0401858bb650980ed8e06b4ac089f96baddf76e95dee0b0b7880a088253d5d25cb5beb65be2dfd17c3163e5ea1480f7b8d56038165c5f26dbca08d593f88bd4edfebe8097e4805f7b206ef16394439ef3dc355718265ac74bd8553a1139a2125ca36a420f9100f61939c57eb0d38af68565b1c76e249b479e8f060aa0c9b046f05876d0cbdc85162029b018ad60d1ce1ae31fff5eafb8fbce64dfafdccd4983b8ab626a2b07cc9dc4843bdc4b96881a31aecdce6a4c4b940735d38fa6b2e206e4c9885d67e09b6f9d01fcbf26398e9b8d0a9adf01248a19c8aed0504e1a1b8597fca753ff0ca519aa915bf876ece0dd21c3b629df60c49de5b1a03997b7f7996fe5e23cb918e3579623b38c29b90e0b8f84449af173f3c1d992e459d2e14a4015d67d16151766e7434cf54e7928ba46ee5bf16165af04b1dbe2137a098a27e759f09fb62d1fd98c9c05ed8d464e14f21342fa207b6253b6ccae048dca4b2cee5747ab8b45aa458614181a942acb683a823b27a234cf14d3bfaabee6f09a25ef0346fc2256d29496c9d1369b961bd1e00b509f29389e71eb94b001ea411b8cba84f9f70a01e25bca1a784635b3e034697c8c16234bd507b81a2a9c0daf96195b3c1822b0ea9fc62e5b0e6dd41b77f4cfee8ddaa163e5b8ccc608c3cf21390ef705bbec2f40061ebe43da04d1adffebc945bac9054fc8349b60f231204d173637f4300945cb0f308a96f89c28e89d75bcfa459d5f90db797d7cd62a9dc027501ab41f81193539b5577a6370de54852af2b5ddda6a8840d37027f6822e256fe40275b7b18eab547a8dc7c17dc5e9b8c9d8a454629c904827bcc668595cb6ab4dc5423baba58584f33134c362a08659e1e7cc5eb6416a266b0d1e1e109cf7f09dc4e030e1739504a09115139098fb8191eeb4737f028ea6097050d2a6ca8421f0bfdec9e1371db8fdfd0c03a1658e94aa7096ca411f205ca997a26fa2676f55f2910cd6ce25b44cdb20e1df995cd12a8caeb0eddf90e575d754ad51190eaddbbee518556ea68df90be8e68611712ff2f729da25ab4adef901dd231389e19ef7839474a814f40d1c65f92f9cde7cb6c53167e6c20e638206a347c07a8832ebdaa46a86829305302c3b067f699540c74eb2dd155eee824dcf438df64ac3bef8600ab2ef6d21d9772d5a8e1173fef91b163d05d62be180ff7ff2604f67fb157de15229ce96911ba5839fcde079f48315c4a6cd4986d69d298946dcc4191d3591c0aa07ce4974cb68c11dae4a136c99c5a2378c20e192572299c68c73389d9a232368ebdf54399c12582295864e5ffd18a9241402c8ea5ca9616fba9b10817ba0bb8301c8424596c975e2bdafcd03dd32d79084cc347902f4c9208adba0c699e707199fe5bd1026638a1c9125e3fcbf2a8fbbba45b78e9734ffe4a098e870628cbcbd7c13c12fbd3d2ac31c4579493dd1c350f0209acb50d914d47023bb9a7e02d0106d800982e8f34834fe562e5ea3aad09a82e8513406faf8e9011f4338b689d635c899018e3e985c7d97680b1c71bed439506db8627191abc8bb7042943c10414e2145df71ac903ffa8958db90e3b2f3ae5c7f6be621e71ef10ca40b07b4aa65ef6adcda901bc6dee0b14034f761cabcb35fd598a3fd1c3c4145a4cc4191f9a9a4bd43d2704dab9d178e4df0fe7752ecfc0d4031e0c9e44a04e90defab1698566e665fbe7e7fd1ac92947dfdb117c582934f607e83bfcd247300dbc069fbddc09c80b5bda81e17a55a459e6c39c22b88e5ce1354cfaedc7d0a7d63dcbe80e12b3f9a7426fe9c4022ecf0a44a4dff07372d443654d04019d6c2758bf7e0b893d4646dc6feb08fada445c65fcd087ba89f7ed15b6f9a685ecaace24f6f3cfc7f59c5b2e846f7b20ff6d1df8730b458b970f00fee445c5d379a2990baf1fcbb693278adf882ac7f9df7a4e8585ebf5af141b924e3443303b33387caf3e10e7cbe575e24ef1261265e22257066495bdef36d42f4b9cb6cdddb1a6ce6fc13f3efd1d57fa2cd07721b2a66ca52b993c55ca826bf7ae925636fbd9dfd56f649167c68b516caa3e15d964d7417f562f262b0db3f23b7ed364b97f9287966bd9b3342d87f8a6198d549ec70dad2cd14385a2fae155cbd625804caa7de21dd7e2c065ce58464c5224cf0d1f6ff0280bbb3c9d72a053f42636e83980dafdd780125b5feaa8a38e5968bfb99c60c9472329fc51380345920924ff1a548de3f21672666ff82b23f548e7b960de27b6bc2d63c2e677c3b141b7a76de2ca1e4977ac7f793411566ed03d10df189780aa67f1a042fce8eca229938c3e385946277c8a3f2dcc22b11af393e662d265be821dde95284b95d58ea367613296c1f472344c3aeffd5a53925dc064809f52a48b1c4f21885b2c40b25ed5b2f8903c6f3223a955dcfd59df657f54a5ad1f39fb8275632872cc960070186268a0334b54e80bbf06aa71d26ba9a00828d421276e9d9b9aba50d0e0f9bdf600a3cd25628b210779955ca53c942c2909fd2a5b067cf6c7fde7ca36949d191a4f71316d52c0be8106066da523d887b8ef0d1de6534a0445b75c23d8b814dd999641a3bb8ce490d70329c9b92e42cb51eee4a5e094aa313dd9da0e88278688052b94e1a628aece8cf9f94cd0f82bbc5984269132e5f8ed54bb515f69a7832bb2368a15e1b604a702266fabcc392e327f987e9438129da28c795ac6e8561a9f30a98d8de8bf0f8da714d264ef413231bc28d7dd52962f116ba7587f7b946a54904105295318f53e96cb6eec3fee53ca92e6007af170b6beb7a9954b8b117472b4b497d5e953717732b374103eb20ce2be0a897a06156dabef6f55c49aa7a69bf53cbff6b1d3cd3c0c5ddaf94ded37f3e9c777c580ccce314da0b5ea2728a78bdb", "2535e652652b8e4e90c1e509c358644a9645934014b02d327b581514068c53c79d78dbe16f1e6b90515fb1baf627eae06ac83a11611a89cbc39a830ea2766f31505e77c80920993fdce16dd3db29faa2001619d7da483696be704b1fe38f6c60110ce3d06e6617b04a124a12841af544b241804bca2b23c0e4d07ec13ca49899e9c5f690b8ffdfcabe137a0fe81762ee6c0f76cbba0bd6b8dcb2f373e86496baa771dfa6beeb218c90d1033a91a1211ec0d4c25c2f360e6bd42c917d5e1e2438d337973248f6d6626d3d2c68059b166a3aa8d58f55c7dbbfa51440b04a203c1f3cfa88a2f8295f521fee39045b59bd5e49565ee98b2ee635258e9f95c99cbf0801f0fef2dba37cb344078d27e081697e6d20b75bb58e9e5ae59032fe6c2cf99895ea2e9fff1b5b9e04e702b51d2e6075ee0b16777b2a6f3b714b1da7ba9af41043f6ea418af7772e0857c7ac179fa0ca37cd543ec5f0ebd0d47afa88234c5a67f5c1d49adee0b5dbb997f8040ef1ad53b35b112888ca8aef695eefe4a8c6beb0d196d2574ef4f4ddee279bcfaf2049782e94f73469920d68f2459c7f3a7df809161bde02c5b457a6b0076f4cf70ff5c89fa05e34620f4a8b3414fcb5701cb602d4c47bc5829ee2dba5025f1116dcb35c4b71d924aca3bdbeb888dc5d119328ff2a4a357da3282bca00d745fdd821fd8fb56b0bf34950a9dae78942ca46618311763e94f5b5fa1a25247859317bc916b078b7aeb69b70ee08c5b97942db785652d2df98ea0e299edd0cf173f108f5a6ffae03961d0e54e0f646ab82f8f2dc251148bc4822d45623bd29a93e066e315f75dc122838e240e29f57b0e3a26876d3c6001d1fba6a533f7b91b984bee18796f0ad8901e94a0b123134cfabfe9062b84bcb8f3d8147f35bdc4f1a19e50b93a729790ba83472d8bfb77871353d461e529ad6a65d005403d2e9495f1878a83520f91f2ff2b94bfc4a1517fc2652dc646f07d58371cc9a7ac0949d7f2681d066616944541046f0a65fc7ab23c39bb5ae769d22420191238b6d7cd23298c4747481950fa016f0887ae0077df34b2e616edca5009512c9de6bdc3aabeac4d46b677f44e5399ac42bc365ef51b5f6b750a002eae710eaf6ad72d25c46f2217fddf2e391faa76eeeb1e9e944f14da1bd114514e3f936a58e466da7ffe47fafde52af3a6e67a7a6d451ba8b494bc93e08a32d3a6165db0403db5ff426a6e5d7c324d1f541e7b779d54909ae240cc3b8f0eada202cdbdb280104a6aa17183685c82df1d8a757e106b8abb62fcc276cc1d37f00a4ea1f644d322bea07c80f3f1e4cdde7e989672be423f03fd3a66444e83bc4039d15bbf4cad09900d704ad0f0135438ab72363e6abf997256929f38d63cf478e1732ff16ac5f3ae5834eee46f373bcff26a43219766a2431f45fc16fb1d2416d7d98b0eda3dba4e020910fec40423d57367b455fc975d929f6104ea8a035f1226a540961fe1d630e9e0af2b1c70c9304fc4d5bc03496996a308be4224f331206f10ddb2f251216ddb4ea1c374b79de0fd4ca4e0529efdef0478e89274af640d5c0b1acfc9c5bce6be0afc1a4fbbad2b9deb2191391a073ca68b9e01f27b33c7b24c7217fa287ffe7e6bb157fb4c1e690dace2f71f93656e49cf0c29a2f77a4520220639f04da0ecf74597565733005df7680fc489d30730d895e78f3e286c2b1ade9a787e64f762fbb6460e802c9c35bf44a9fbcdd15dcac310bd4580e9298fcd583b2a068f3edf201b8430c726f63eeb7913ea74a1e37fa9dfbc023843a910e99fd4a8f1acb6df61b3dbfdae75a0861669dc8a3a7eed7eff6388e363e1ca6ad5f0bffb62c64ef99be948f7529719b528caea919a8efc4c2d5492eb64c7cba09a11f8f5d52582207e703bd7ce7c3a8949b00aef120ad8cf6e531de6765ace8bbb4d45f61cf075abb2af2794dfbb65ec019a6ea47c0c81e345a3265b85b4c5ad4a4c5c3040a3f134626aeac019f04a61f0c1e6f906d5371e82cd708b73cc606fa73d304d5003fa3fde4817072798127dfc06ac7097355959a18bf22b46e165e3f40db5c014b798f6734304350b70658b8f394a1205c2f582554c72818d9eca4e487cf26c7bee2bb86c44a4259213b8370a32c64b95914aa1dbe282504e0f26f07d9d7f58bda76083ec2ad3bde6f62217a9801292fb20a0b409d7f81a816ac5da5772291937341efaff3a3478f6b82a65dd1c2f2aab0c38958c2b121f3457000b2848cc55678e2d44710c4902229097ce1aed33805c876891767a9726f4f2931262d4cee51cdc48dad88f41e1ea9a3041f37fa3329d6a83151cc799b1a82ecd9c8142207e86524d6bd3f4de32cc4ef505721ff86f79aa4aa44d10bd1fb35b20b972de84e94a2833125d2480e54311bd6dac5c2d92ec4df30eb8b6da8bb69b956e8906d66636442c1754ada641e6f40cf3cf25aefeda2bf43f721144f6a04f3817c7f141343a85b173ee16a47ddd9bf7c7eb2b7411ffe14c7577786e571d1c58d869107cc699468e31e76348e9835e6d1e688d61f93bb4e84929d3ba01e653213cf633f880f7f293ac6a5fd688371da0752ef16de6fa850ed21bbc7fb5522047e7ce084625a9e9db58b1105be9462a85fb843c3341074afdd7143d0e7155cbb1715def86353d1356da55427845ac9578a98c3f6ef9540a5b383e5162a5c3b5050632a36b1608dc642efe55cefc48b1e3f6577be3bafd729e6ac076e032fa97ef9f277b05cd950bdab91478f88b8bfdd47a798dbda6e422f7a1757b0af740019d68aaf2424a9361e9b5ade05bba471c7796f8e7ab5272c83771ca7b092c06aca147301b55efa2db6056aa6cd16ef6faa128e9befa4819719434316ea2183a3e0baf051b78c415fa211abd8e8f95ef2f8a54ef0591140bf2902fcde99e9fdae932512c1e4d86b0c4bb6b9c2e08c5724bdea06630460e43ed74f8e8ecd16426f15be8f2216de9d5163d7b16bfe211c91a57422a9453dbc6e48ba74b4360a9e86d2af388f394e0e877deea01f7eaf56777e35b0170728155ddc760a24d6cf9a0627fd02ba558963d62f55a7272da596dfe1ae22261de06123171f04a0075034348cd0c4f13d14b392ac70f77098902c392560a7c6b0b62550dad4133abafed7e1f00475f3862da833d0dd020b75ce591705390d84e24dfb51676f67d4791f3d914b8f8e9196631a4c0240b6698adc57afba22357388adf99ed7fad77577c94ca17b414077e9834704c83f168b253e539f79ba7fb32be551218f8d9d1981a4621849e135bb57bd7583809f4dd742b7583d7ecf186db1d27a2a4f42d8cd124b904aa6396a1b77480840551630f8d5aaf001ec9371466335dcb119bb4e38506ff2e21e2c062976afd124516731a843cf408458b8370eafcc0a5d0b0f8bdcbf9c14898b4d99f09f17a73f98a21c088d5a40740e79ec1999c431b3c450106f2283c89a5d5e8fa688777ffed8a3310a5e9bb2dc93441487254d8963701eb4c857adede7513b3fa02903875abd7f293abe15c72f6c88c76be31b6d4ee653c21936d20aaa686964433642dbc1945655c4c33dab5bd0b0064dcd463b4332af47246cba86d6a9ac99e6d061feb64a684266fd2f8829e922d91b5158c6777fdf97c63b993f6d750469a4d8d41b6fbcea6ca3d426162992b870b0717fe9f9fa9d46fd6902212351f2d1cecbabff3130bae9a5e401bb3a5d35d45abff8df2284982d1a1a594ed0bcdde528d3a5947ec3c4933732af62eb876d1c5f3ab76efb264e45ca91407dd3aa6b7a1be61bd95513c4d16c6816c1d17391b19e5084557f8e2631e91fcfca56339d9c03f73616948a76bc0e903f146e0f8007d4e344e5c7b94d576815fd22858bccd44ed534d50651113d3377ae256b1d015246c83f6063d1c8a40009591bef2c6e431df546f29da38e7befbfcdb2ec588a8f81249766f2e098f75c14f772372c94a2446280d9e7b42a20dfb599f3ab365172499df5b2d88b5da3fc64d511792e5e166049fa8b965482eb0d9595b044a683894cf2d32682df24bee5c212b761b9204a06148bcbeb39b006d1dac1b2dc458766597bc44ad62b072f606f30a3367c9dacbedd07fda7619a2452586df8c88b3c91110e24c7230c60de15db94c7abccbd29741cb03aef9b74258782ea7dfca2c2d82ced61462898eb92e3b7f861680bdeac29e659c5ab95be1f069410d1b6eaa4e40038d4e82f4fd9ae0c7e8222329a15aa7e84b569372eebf59a3755817b3ec2db831be091e115ddedfcd08b38b0b9b7f1f25d707ef906edd1315a4acd29691987dce126f9b6edb3fd9d738768104ae73018f8a3963f9511a356f8c7d4067b411cc891ebe4490668f2788da28045e675f19c4c24506f58b59861122c047d02f6cafa7cb64872ea179b22df9f3f18ad0ac7bf8fce94bad934e882226d6d8812c06e174d4fcefe9b81d5738c60975b89de6e36bb7a7b943e6d6d2d90f85a8c5956b9fe16a37f7d87f96060eb97da6eccf4e169e52994830d7803b23bf1be59643c6d9af405aa348ce1718f8aa30dcfee7491a3d8ed9276e2819177e57233bf9de0386c21c57b4943c2d8395fe2e18d94cfccb8a6cc53abf4e310e1bce06da99fb774e535f2b1908673b687dab5282ce7b8dec29ff435a5a5e7495513915dab416b554277b3ef0d1f37d7f10024a101c7051c7f13f8bb842ca9c28ddd87f5779052bc145dde6b508ced79b8531a4d5fd24f8ff1fc66f1365a439b6926b20e9e4639bcbadbad882238fcb5a2ba2d1b31ec4513bf406e53eb0065065af0918b97a33d8bec56f5c07553d090fd7a95a59a1db404d09826378328bb618a0c800ccdacfc280b2c6d5207f2e16ad203a27188eb70b602f8a23ad3ff7306f6f59cdc80f25641d33c0cac73a7cc5ec6c4f353777aae438125bff1e4e593b34c503c80525654ce0d6822c3be7e12e200a788a9af5d4a9f16741f6ddde3681431a758ab6cc926e0dadc6df05f0cd2f9ec76838c3967c82b91966fe24c04abfb387258b1cbefbfe5cc23e51dcd9138ca004d74fa688aee943c9c3c5e85cb3f3e6b01d1db8ba5ab055453fb270b5ddbb64010ffba8f8c3ad040cac6169a3b8288b10dd5968b22add3aad18e47071347406cf45e62c855382c1a2b5aa68f0f0a2d10ec8857854a7422f5e53a24419ffd0279e158a1d57fd355848fed355687f62688c54e9b20db397c95bb7c6f3deb1b33ee2d8dc5f3429e9875307dddabbc8b437cfe071f747eb56a32b9401424ea9b96e69634b5898bb916d0a1d1c785a8904e8134327b6537e9c590d1f4be8c66bb063fade7980931c58b8987e3b7022cec4072f8011502051648b5baf39cf5d644c800c881c67861ab8fc60471f0fed8108534dd34ddf076d4631f9640a46f2e763a85dc7f27a03f8063bdb9b65c004f22afb07380349749c25bb5021885a247a4799e4ee25f705b7264ab21a6a61bef6dbc72217da95946011f05337b569c0ef20a626635017d43006f739f0733edef5c9c53fd510aa433ab7ba3cd1a67c6c6e7fb2e348d891f8a66f335eda1bf50eb618ae001d7cf32283be7b263fb3dc14401ae79a312ad6e706b2b79fcadb2ca8187845aa13b2b0b2cfe597422b99f16a7722dfeaa1a380cba9274aba00d2c1489f1f5867721cc58c617a56dc662471a55398dc816d9cd991a3bb95db60877e748c74613c0b9b4450559d0b8f7daeaaae496be43146a8a0073bc194158f4c69c69dc3abd9ca402b9cea27eccd2b0e598cb36d64a2730ac589fb95588df"}) 10:31:21 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f43600000000000000"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "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", "2535e652652b8e4e90c1e509c358644a9645934014b02d327b581514068c53c79d78dbe16f1e6b90515fb1baf627eae06ac83a11611a89cbc39a830ea2766f31505e77c80920993fdce16dd3db29faa2001619d7da483696be704b1fe38f6c60110ce3d06e6617b04a124a12841af544b241804bca2b23c0e4d07ec13ca49899e9c5f690b8ffdfcabe137a0fe81762ee6c0f76cbba0bd6b8dcb2f373e86496baa771dfa6beeb218c90d1033a91a1211ec0d4c25c2f360e6bd42c917d5e1e2438d337973248f6d6626d3d2c68059b166a3aa8d58f55c7dbbfa51440b04a203c1f3cfa88a2f8295f521fee39045b59bd5e49565ee98b2ee635258e9f95c99cbf0801f0fef2dba37cb344078d27e081697e6d20b75bb58e9e5ae59032fe6c2cf99895ea2e9fff1b5b9e04e702b51d2e6075ee0b16777b2a6f3b714b1da7ba9af41043f6ea418af7772e0857c7ac179fa0ca37cd543ec5f0ebd0d47afa88234c5a67f5c1d49adee0b5dbb997f8040ef1ad53b35b112888ca8aef695eefe4a8c6beb0d196d2574ef4f4ddee279bcfaf2049782e94f73469920d68f2459c7f3a7df809161bde02c5b457a6b0076f4cf70ff5c89fa05e34620f4a8b3414fcb5701cb602d4c47bc5829ee2dba5025f1116dcb35c4b71d924aca3bdbeb888dc5d119328ff2a4a357da3282bca00d745fdd821fd8fb56b0bf34950a9dae78942ca46618311763e94f5b5fa1a25247859317bc916b078b7aeb69b70ee08c5b97942db785652d2df98ea0e299edd0cf173f108f5a6ffae03961d0e54e0f646ab82f8f2dc251148bc4822d45623bd29a93e066e315f75dc122838e240e29f57b0e3a26876d3c6001d1fba6a533f7b91b984bee18796f0ad8901e94a0b123134cfabfe9062b84bcb8f3d8147f35bdc4f1a19e50b93a729790ba83472d8bfb77871353d461e529ad6a65d005403d2e9495f1878a83520f91f2ff2b94bfc4a1517fc2652dc646f07d58371cc9a7ac0949d7f2681d066616944541046f0a65fc7ab23c39bb5ae769d22420191238b6d7cd23298c4747481950fa016f0887ae0077df34b2e616edca5009512c9de6bdc3aabeac4d46b677f44e5399ac42bc365ef51b5f6b750a002eae710eaf6ad72d25c46f2217fddf2e391faa76eeeb1e9e944f14da1bd114514e3f936a58e466da7ffe47fafde52af3a6e67a7a6d451ba8b494bc93e08a32d3a6165db0403db5ff426a6e5d7c324d1f541e7b779d54909ae240cc3b8f0eada202cdbdb280104a6aa17183685c82df1d8a757e106b8abb62fcc276cc1d37f00a4ea1f644d322bea07c80f3f1e4cdde7e989672be423f03fd3a66444e83bc4039d15bbf4cad09900d704ad0f0135438ab72363e6abf997256929f38d63cf478e1732ff16ac5f3ae5834eee46f373bcff26a43219766a2431f45fc16fb1d2416d7d98b0eda3dba4e020910fec40423d57367b455fc975d929f6104ea8a035f1226a540961fe1d630e9e0af2b1c70c9304fc4d5bc03496996a308be4224f331206f10ddb2f251216ddb4ea1c374b79de0fd4ca4e0529efdef0478e89274af640d5c0b1acfc9c5bce6be0afc1a4fbbad2b9deb2191391a073ca68b9e01f27b33c7b24c7217fa287ffe7e6bb157fb4c1e690dace2f71f93656e49cf0c29a2f77a4520220639f04da0ecf74597565733005df7680fc489d30730d895e78f3e286c2b1ade9a787e64f762fbb6460e802c9c35bf44a9fbcdd15dcac310bd4580e9298fcd583b2a068f3edf201b8430c726f63eeb7913ea74a1e37fa9dfbc023843a910e99fd4a8f1acb6df61b3dbfdae75a0861669dc8a3a7eed7eff6388e363e1ca6ad5f0bffb62c64ef99be948f7529719b528caea919a8efc4c2d5492eb64c7cba09a11f8f5d52582207e703bd7ce7c3a8949b00aef120ad8cf6e531de6765ace8bbb4d45f61cf075abb2af2794dfbb65ec019a6ea47c0c81e345a3265b85b4c5ad4a4c5c3040a3f134626aeac019f04a61f0c1e6f906d5371e82cd708b73cc606fa73d304d5003fa3fde4817072798127dfc06ac7097355959a18bf22b46e165e3f40db5c014b798f6734304350b70658b8f394a1205c2f582554c72818d9eca4e487cf26c7bee2bb86c44a4259213b8370a32c64b95914aa1dbe282504e0f26f07d9d7f58bda76083ec2ad3bde6f62217a9801292fb20a0b409d7f81a816ac5da5772291937341efaff3a3478f6b82a65dd1c2f2aab0c38958c2b121f3457000b2848cc55678e2d44710c4902229097ce1aed33805c876891767a9726f4f2931262d4cee51cdc48dad88f41e1ea9a3041f37fa3329d6a83151cc799b1a82ecd9c8142207e86524d6bd3f4de32cc4ef505721ff86f79aa4aa44d10bd1fb35b20b972de84e94a2833125d2480e54311bd6dac5c2d92ec4df30eb8b6da8bb69b956e8906d66636442c1754ada641e6f40cf3cf25aefeda2bf43f721144f6a04f3817c7f141343a85b173ee16a47ddd9bf7c7eb2b7411ffe14c7577786e571d1c58d869107cc699468e31e76348e9835e6d1e688d61f93bb4e84929d3ba01e653213cf633f880f7f293ac6a5fd688371da0752ef16de6fa850ed21bbc7fb5522047e7ce084625a9e9db58b1105be9462a85fb843c3341074afdd7143d0e7155cbb1715def86353d1356da55427845ac9578a98c3f6ef9540a5b383e5162a5c3b5050632a36b1608dc642efe55cefc48b1e3f6577be3bafd729e6ac076e032fa97ef9f277b05cd950bdab91478f88b8bfdd47a798dbda6e422f7a1757b0af740019d68aaf2424a9361e9b5ade05bba471c7796f8e7ab5272c83771ca7b092c06aca147301b55efa2db6056aa6cd16ef6faa128e9befa4819719434316ea2183a3e0baf051b78c415fa211abd8e8f95ef2f8a54ef0591140bf2902fcde99e9fdae932512c1e4d86b0c4bb6b9c2e08c5724bdea06630460e43ed74f8e8ecd16426f15be8f2216de9d5163d7b16bfe211c91a57422a9453dbc6e48ba74b4360a9e86d2af388f394e0e877deea01f7eaf56777e35b0170728155ddc760a24d6cf9a0627fd02ba558963d62f55a7272da596dfe1ae22261de06123171f04a0075034348cd0c4f13d14b392ac70f77098902c392560a7c6b0b62550dad4133abafed7e1f00475f3862da833d0dd020b75ce591705390d84e24dfb51676f67d4791f3d914b8f8e9196631a4c0240b6698adc57afba22357388adf99ed7fad77577c94ca17b414077e9834704c83f168b253e539f79ba7fb32be551218f8d9d1981a4621849e135bb57bd7583809f4dd742b7583d7ecf186db1d27a2a4f42d8cd124b904aa6396a1b77480840551630f8d5aaf001ec9371466335dcb119bb4e38506ff2e21e2c062976afd124516731a843cf408458b8370eafcc0a5d0b0f8bdcbf9c14898b4d99f09f17a73f98a21c088d5a40740e79ec1999c431b3c450106f2283c89a5d5e8fa688777ffed8a3310a5e9bb2dc93441487254d8963701eb4c857adede7513b3fa02903875abd7f293abe15c72f6c88c76be31b6d4ee653c21936d20aaa686964433642dbc1945655c4c33dab5bd0b0064dcd463b4332af47246cba86d6a9ac99e6d061feb64a684266fd2f8829e922d91b5158c6777fdf97c63b993f6d750469a4d8d41b6fbcea6ca3d426162992b870b0717fe9f9fa9d46fd6902212351f2d1cecbabff3130bae9a5e401bb3a5d35d45abff8df2284982d1a1a594ed0bcdde528d3a5947ec3c4933732af62eb876d1c5f3ab76efb264e45ca91407dd3aa6b7a1be61bd95513c4d16c6816c1d17391b19e5084557f8e2631e91fcfca56339d9c03f73616948a76bc0e903f146e0f8007d4e344e5c7b94d576815fd22858bccd44ed534d50651113d3377ae256b1d015246c83f6063d1c8a40009591bef2c6e431df546f29da38e7befbfcdb2ec588a8f81249766f2e098f75c14f772372c94a2446280d9e7b42a20dfb599f3ab365172499df5b2d88b5da3fc64d511792e5e166049fa8b965482eb0d9595b044a683894cf2d32682df24bee5c212b761b9204a06148bcbeb39b006d1dac1b2dc458766597bc44ad62b072f606f30a3367c9dacbedd07fda7619a2452586df8c88b3c91110e24c7230c60de15db94c7abccbd29741cb03aef9b74258782ea7dfca2c2d82ced61462898eb92e3b7f861680bdeac29e659c5ab95be1f069410d1b6eaa4e40038d4e82f4fd9ae0c7e8222329a15aa7e84b569372eebf59a3755817b3ec2db831be091e115ddedfcd08b38b0b9b7f1f25d707ef906edd1315a4acd29691987dce126f9b6edb3fd9d738768104ae73018f8a3963f9511a356f8c7d4067b411cc891ebe4490668f2788da28045e675f19c4c24506f58b59861122c047d02f6cafa7cb64872ea179b22df9f3f18ad0ac7bf8fce94bad934e882226d6d8812c06e174d4fcefe9b81d5738c60975b89de6e36bb7a7b943e6d6d2d90f85a8c5956b9fe16a37f7d87f96060eb97da6eccf4e169e52994830d7803b23bf1be59643c6d9af405aa348ce1718f8aa30dcfee7491a3d8ed9276e2819177e57233bf9de0386c21c57b4943c2d8395fe2e18d94cfccb8a6cc53abf4e310e1bce06da99fb774e535f2b1908673b687dab5282ce7b8dec29ff435a5a5e7495513915dab416b554277b3ef0d1f37d7f10024a101c7051c7f13f8bb842ca9c28ddd87f5779052bc145dde6b508ced79b8531a4d5fd24f8ff1fc66f1365a439b6926b20e9e4639bcbadbad882238fcb5a2ba2d1b31ec4513bf406e53eb0065065af0918b97a33d8bec56f5c07553d090fd7a95a59a1db404d09826378328bb618a0c800ccdacfc280b2c6d5207f2e16ad203a27188eb70b602f8a23ad3ff7306f6f59cdc80f25641d33c0cac73a7cc5ec6c4f353777aae438125bff1e4e593b34c503c80525654ce0d6822c3be7e12e200a788a9af5d4a9f16741f6ddde3681431a758ab6cc926e0dadc6df05f0cd2f9ec76838c3967c82b91966fe24c04abfb387258b1cbefbfe5cc23e51dcd9138ca004d74fa688aee943c9c3c5e85cb3f3e6b01d1db8ba5ab055453fb270b5ddbb64010ffba8f8c3ad040cac6169a3b8288b10dd5968b22add3aad18e47071347406cf45e62c855382c1a2b5aa68f0f0a2d10ec8857854a7422f5e53a24419ffd0279e158a1d57fd355848fed355687f62688c54e9b20db397c95bb7c6f3deb1b33ee2d8dc5f3429e9875307dddabbc8b437cfe071f747eb56a32b9401424ea9b96e69634b5898bb916d0a1d1c785a8904e8134327b6537e9c590d1f4be8c66bb063fade7980931c58b8987e3b7022cec4072f8011502051648b5baf39cf5d644c800c881c67861ab8fc60471f0fed8108534dd34ddf076d4631f9640a46f2e763a85dc7f27a03f8063bdb9b65c004f22afb07380349749c25bb5021885a247a4799e4ee25f705b7264ab21a6a61bef6dbc72217da95946011f05337b569c0ef20a626635017d43006f739f0733edef5c9c53fd510aa433ab7ba3cd1a67c6c6e7fb2e348d891f8a66f335eda1bf50eb618ae001d7cf32283be7b263fb3dc14401ae79a312ad6e706b2b79fcadb2ca8187845aa13b2b0b2cfe597422b99f16a7722dfeaa1a380cba9274aba00d2c1489f1f5867721cc58c617a56dc662471a55398dc816d9cd991a3bb95db60877e748c74613c0b9b4450559d0b8f7daeaaae496be43146a8a0073bc194158f4c69c69dc3abd9ca402b9cea27eccd2b0e598cb36d64a2730ac589fb95588df"}) 10:31:22 executing program 5: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f4360000000000000000"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) 10:31:22 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:22 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f4360000000000000000"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) 10:31:22 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:22 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f4360000000000000000"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "245546e1b57a01fc0b7a2bf349f3ba806c772a2b436327706a3117050605b942ca899b86cc056ef712f787b24f5b94917cce765f2ddb44d30616bc32318a3d6cf1d1097dcfb571e984efb3856f3aa6810394d9bec693630611a624fd2cead37c13b942da855781b9f2267390881810c0c831d0f2991c3671734341bb7d2b15ec06be5ca6e65f89faa61faab4883e69654b73877afd3a392eeeb89dae8b149dbb00dafa792211c194a0bccbf549d196ab3f82d5d6b3b038787dd8f980d42f18f74beb947371dee8db5a1f0b71e6249ca040fdd2b4d66a83c3a9ed828d3447dfb659731a28ed3be3da94d339dca3cb80248428f229bc11f40555866c4524ce0271ab34bece9d19f5a7ae2659bd408c7ddf9a25415fafdadb36864be3ac3aa0f04c9f981dd209e5f641e7d3baff72b0d0f3abff731618ff41afb483d7c2a8a1029bfa255e2aa96fb580c1eef7b5e84f7df0d2dba962afcb9a2a770e36bf93999465e6737dd57e564177b9752b13fd046b8a71052a6203d08080c2d748b7c366a56333168fed684a5d22a35abdbd0ccb65daa03f5e3cc07a89d73d18da38ceb0c1bdceb8afc49dd60b8d2ca6947ce6ce0d655f77b57e2aed0da33feab7f3434cb57df7d8c2e72d957898e4ea007953187763dd870a22c3acf25c3cfc35eab25be8441e7588bf255c693608530856515d4e047df9c9a5cd5a8481cc04d78b347d6f314714516f5fdbb65e874c2bc0128d82f031d35e175cb440fb6fda64c7a90f2c7493c9cfd6d1858dc5c145df55b5948242db084efe95141645802eb1cec1d9cc9e5bb3791eeae916be212f25e6ca5134739f12c13536d0118bbac49495ea6b77a24519bd5fdcb1c8a5a4a30280b34d1900dd119ec039a5c7aba8d17b3219b74635140d8cf76871c793784a8a981258f72231aa75bdc9ad1d6339608dee474a3856aca9bc2ef131640ec7f09d4a737431c552a876755801dd1c3351a4c166b94b201fa2523ad6aba700c9b27a400b540d7dafc8cb5c046406ecdb26a67da469057e21392df1824da6997ce6b1be281bc033b7a5ef85fa5f8b57eea501936bee184fdf7772ebb78fee253e97f9215ccb28afb41dea041f9853333681cc00ef2a85cddbc546d0f544909a1a7a4c4beb46b06c72657da640544837b343d2139c944adbb6f6303b3978efab19ba0b549941fd51c64ddd352fdfef6c458e7449b4cdc2dfa75de15e4e2c78bfb21382d522684b11c786786d39b8e74ff0884f3d20a39ab999fbe3a8a630e7af7e62d1eee2e9aaf1348723a5f6a9217b174f0c323a14f4f14890d41f2d7e2ddf523116763dc53a0b32560c6cfa8c5bdb1cfdb030e307da1838cf7ef4cc997897925f64a2c5d144bd264904550a572c6ad711693ea7b1b841943eb533a66186aa4698e4b2490943a5bd8075ee6b0c24e4b1571f7f6ee9d98eec676a8d5c05ecb7fe8322e862785478c794f69cd9c5322d0ff68b3d6e124820887705189a9831381e37fa1f18678e6254e6e80a7ce8a1cd965065fea6d48acfe2fb25a302a98b518abb992371eb99c7d47f9cfe96bef9bbaff1453fd20973446518bd3d11e53d76b8714e87d737bdf3b306753e138f27e79916da2ce54edcdedb975d49f2c77da894d0dd04d1a3e675c2e7f978bdbd7668de303192c7af8706a5ada50e8f0d6843aa3c36d7836e88930409c60bf03e0ae8a3e7c601e2b4678024efb5e91dc231007e1f7e637efd08b729d790b899944421680d917d590b0659cbb3406dc7d1eaa5b461aa7c979ed3eaeb09fb7fe1c4c5c00bd3862bfc8160f04f7aae671fcf1aecd54ea192f4a0ae2c3762ddc38e3a212008a24488a2ae98731a19cfcc4881c5fbe08a3696927b8ff7e853d3097ca1840c5fc4b49e881de5af9c82d76b5723821db4480e8d1a66084274d2811f038d017af68c4f0412893a783f476a538d84e43853a913a20afbb927614f1ddcd5641973f784713eb25d0498b9f9d66a82a4294262e661c67295bb4f43593d9d9e3bff30eb67e479981c7e9c6bf32333f0ac688f22e984cad4c4004e5382e3d4ed7e79add11f86eaa4464e2ff0e568153768fdbcfb26bce8692dc62f069c5cefa204122289ce5c9e0618b6a1b20d7f37e88044c38339fc746703fd3ae1ee583717e94d01f4c194e4908b901c7ac02829fe0ea318f12249c4f1378c92465ce7a8f37bab36e9857f859aceb8e7fbb557aa5c07d2b37f6d440a59e76bbfbd1f6fd92375eb9d0d4ac9de484abc23369e867a6b024bcaa54376fea8ccc3a32f127042777b083474d3c77d77f3f5f4a9df5fde25ef45fffd1874b17c6701010d35e44419c0b2f42edee781b4531b419e6767b775079d38aaf2a48aa540c0597ea20352532471c093c7e4079bfd649d4a69fd3f47298c89eb848b566532e4531b07f1baf2ea681880682957d44709666610bff4ba2bf4321e1fa65d21623a013566247ba45f4f97d2d652a237460ba1c663e64fb61fada7f366d22d41ed8e7889ac853cf45ee822f3b5ccc324ef0aa2e886fde7447f2cf83d2b991852181e952541cb196708f747ffb8232b7959b7b182fc46046b257c295667e8fd82a386e2be8c6df13ea1283ac111eb9d1660403672fe8c37ab0e1aa0feb7c6607c1c34a82d321e673f31c2579e2c6f737f08bd131ede7990129167dd831666bc1d26202c5787a2ee1847104ea242a1166015da1c1bdc022dc5dfbc927e657579fc444a04947270e358f913fdfc5f902da88bf05cdb560d5a76d5412508a154ff6ea33fd970cb8800cd49a383153b899ddf9faa239b865b7f3ed622bbc1930b33528d6e6bb583ed9559d49eecb7905e59bb26fbf3fb0cd0a61fcea1b17e339dc537f3954ffb0401858bb650980ed8e06b4ac089f96baddf76e95dee0b0b7880a088253d5d25cb5beb65be2dfd17c3163e5ea1480f7b8d56038165c5f26dbca08d593f88bd4edfebe8097e4805f7b206ef16394439ef3dc355718265ac74bd8553a1139a2125ca36a420f9100f61939c57eb0d38af68565b1c76e249b479e8f060aa0c9b046f05876d0cbdc85162029b018ad60d1ce1ae31fff5eafb8fbce64dfafdccd4983b8ab626a2b07cc9dc4843bdc4b96881a31aecdce6a4c4b940735d38fa6b2e206e4c9885d67e09b6f9d01fcbf26398e9b8d0a9adf01248a19c8aed0504e1a1b8597fca753ff0ca519aa915bf876ece0dd21c3b629df60c49de5b1a03997b7f7996fe5e23cb918e3579623b38c29b90e0b8f84449af173f3c1d992e459d2e14a4015d67d16151766e7434cf54e7928ba46ee5bf16165af04b1dbe2137a098a27e759f09fb62d1fd98c9c05ed8d464e14f21342fa207b6253b6ccae048dca4b2cee5747ab8b45aa458614181a942acb683a823b27a234cf14d3bfaabee6f09a25ef0346fc2256d29496c9d1369b961bd1e00b509f29389e71eb94b001ea411b8cba84f9f70a01e25bca1a784635b3e034697c8c16234bd507b81a2a9c0daf96195b3c1822b0ea9fc62e5b0e6dd41b77f4cfee8ddaa163e5b8ccc608c3cf21390ef705bbec2f40061ebe43da04d1adffebc945bac9054fc8349b60f231204d173637f4300945cb0f308a96f89c28e89d75bcfa459d5f90db797d7cd62a9dc027501ab41f81193539b5577a6370de54852af2b5ddda6a8840d37027f6822e256fe40275b7b18eab547a8dc7c17dc5e9b8c9d8a454629c904827bcc668595cb6ab4dc5423baba58584f33134c362a08659e1e7cc5eb6416a266b0d1e1e109cf7f09dc4e030e1739504a09115139098fb8191eeb4737f028ea6097050d2a6ca8421f0bfdec9e1371db8fdfd0c03a1658e94aa7096ca411f205ca997a26fa2676f55f2910cd6ce25b44cdb20e1df995cd12a8caeb0eddf90e575d754ad51190eaddbbee518556ea68df90be8e68611712ff2f729da25ab4adef901dd231389e19ef7839474a814f40d1c65f92f9cde7cb6c53167e6c20e638206a347c07a8832ebdaa46a86829305302c3b067f699540c74eb2dd155eee824dcf438df64ac3bef8600ab2ef6d21d9772d5a8e1173fef91b163d05d62be180ff7ff2604f67fb157de15229ce96911ba5839fcde079f48315c4a6cd4986d69d298946dcc4191d3591c0aa07ce4974cb68c11dae4a136c99c5a2378c20e192572299c68c73389d9a232368ebdf54399c12582295864e5ffd18a9241402c8ea5ca9616fba9b10817ba0bb8301c8424596c975e2bdafcd03dd32d79084cc347902f4c9208adba0c699e707199fe5bd1026638a1c9125e3fcbf2a8fbbba45b78e9734ffe4a098e870628cbcbd7c13c12fbd3d2ac31c4579493dd1c350f0209acb50d914d47023bb9a7e02d0106d800982e8f34834fe562e5ea3aad09a82e8513406faf8e9011f4338b689d635c899018e3e985c7d97680b1c71bed439506db8627191abc8bb7042943c10414e2145df71ac903ffa8958db90e3b2f3ae5c7f6be621e71ef10ca40b07b4aa65ef6adcda901bc6dee0b14034f761cabcb35fd598a3fd1c3c4145a4cc4191f9a9a4bd43d2704dab9d178e4df0fe7752ecfc0d4031e0c9e44a04e90defab1698566e665fbe7e7fd1ac92947dfdb117c582934f607e83bfcd247300dbc069fbddc09c80b5bda81e17a55a459e6c39c22b88e5ce1354cfaedc7d0a7d63dcbe80e12b3f9a7426fe9c4022ecf0a44a4dff07372d443654d04019d6c2758bf7e0b893d4646dc6feb08fada445c65fcd087ba89f7ed15b6f9a685ecaace24f6f3cfc7f59c5b2e846f7b20ff6d1df8730b458b970f00fee445c5d379a2990baf1fcbb693278adf882ac7f9df7a4e8585ebf5af141b924e3443303b33387caf3e10e7cbe575e24ef1261265e22257066495bdef36d42f4b9cb6cdddb1a6ce6fc13f3efd1d57fa2cd07721b2a66ca52b993c55ca826bf7ae925636fbd9dfd56f649167c68b516caa3e15d964d7417f562f262b0db3f23b7ed364b97f9287966bd9b3342d87f8a6198d549ec70dad2cd14385a2fae155cbd625804caa7de21dd7e2c065ce58464c5224cf0d1f6ff0280bbb3c9d72a053f42636e83980dafdd780125b5feaa8a38e5968bfb99c60c9472329fc51380345920924ff1a548de3f21672666ff82b23f548e7b960de27b6bc2d63c2e677c3b141b7a76de2ca1e4977ac7f793411566ed03d10df189780aa67f1a042fce8eca229938c3e385946277c8a3f2dcc22b11af393e662d265be821dde95284b95d58ea367613296c1f472344c3aeffd5a53925dc064809f52a48b1c4f21885b2c40b25ed5b2f8903c6f3223a955dcfd59df657f54a5ad1f39fb8275632872cc960070186268a0334b54e80bbf06aa71d26ba9a00828d421276e9d9b9aba50d0e0f9bdf600a3cd25628b210779955ca53c942c2909fd2a5b067cf6c7fde7ca36949d191a4f71316d52c0be8106066da523d887b8ef0d1de6534a0445b75c23d8b814dd999641a3bb8ce490d70329c9b92e42cb51eee4a5e094aa313dd9da0e88278688052b94e1a628aece8cf9f94cd0f82bbc5984269132e5f8ed54bb515f69a7832bb2368a15e1b604a702266fabcc392e327f987e9438129da28c795ac6e8561a9f30a98d8de8bf0f8da714d264ef413231bc28d7dd52962f116ba7587f7b946a54904105295318f53e96cb6eec3fee53ca92e6007af170b6beb7a9954b8b117472b4b497d5e953717732b374103eb20ce2be0a897a06156dabef6f55c49aa7a69bf53cbff6b1d3cd3c0c5ddaf94ded37f3e9c777c580ccce314da0b5ea2728a78bdb", "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"}) 10:31:23 executing program 5: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:23 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f436000000000000000001"]) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) 10:31:23 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f436000000000000000001"]) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) 10:31:23 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f436000000000000000001"]) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "245546e1b57a01fc0b7a2bf349f3ba806c772a2b436327706a3117050605b942ca899b86cc056ef712f787b24f5b94917cce765f2ddb44d30616bc32318a3d6cf1d1097dcfb571e984efb3856f3aa6810394d9bec693630611a624fd2cead37c13b942da855781b9f2267390881810c0c831d0f2991c3671734341bb7d2b15ec06be5ca6e65f89faa61faab4883e69654b73877afd3a392eeeb89dae8b149dbb00dafa792211c194a0bccbf549d196ab3f82d5d6b3b038787dd8f980d42f18f74beb947371dee8db5a1f0b71e6249ca040fdd2b4d66a83c3a9ed828d3447dfb659731a28ed3be3da94d339dca3cb80248428f229bc11f40555866c4524ce0271ab34bece9d19f5a7ae2659bd408c7ddf9a25415fafdadb36864be3ac3aa0f04c9f981dd209e5f641e7d3baff72b0d0f3abff731618ff41afb483d7c2a8a1029bfa255e2aa96fb580c1eef7b5e84f7df0d2dba962afcb9a2a770e36bf93999465e6737dd57e564177b9752b13fd046b8a71052a6203d08080c2d748b7c366a56333168fed684a5d22a35abdbd0ccb65daa03f5e3cc07a89d73d18da38ceb0c1bdceb8afc49dd60b8d2ca6947ce6ce0d655f77b57e2aed0da33feab7f3434cb57df7d8c2e72d957898e4ea007953187763dd870a22c3acf25c3cfc35eab25be8441e7588bf255c693608530856515d4e047df9c9a5cd5a8481cc04d78b347d6f314714516f5fdbb65e874c2bc0128d82f031d35e175cb440fb6fda64c7a90f2c7493c9cfd6d1858dc5c145df55b5948242db084efe95141645802eb1cec1d9cc9e5bb3791eeae916be212f25e6ca5134739f12c13536d0118bbac49495ea6b77a24519bd5fdcb1c8a5a4a30280b34d1900dd119ec039a5c7aba8d17b3219b74635140d8cf76871c793784a8a981258f72231aa75bdc9ad1d6339608dee474a3856aca9bc2ef131640ec7f09d4a737431c552a876755801dd1c3351a4c166b94b201fa2523ad6aba700c9b27a400b540d7dafc8cb5c046406ecdb26a67da469057e21392df1824da6997ce6b1be281bc033b7a5ef85fa5f8b57eea501936bee184fdf7772ebb78fee253e97f9215ccb28afb41dea041f9853333681cc00ef2a85cddbc546d0f544909a1a7a4c4beb46b06c72657da640544837b343d2139c944adbb6f6303b3978efab19ba0b549941fd51c64ddd352fdfef6c458e7449b4cdc2dfa75de15e4e2c78bfb21382d522684b11c786786d39b8e74ff0884f3d20a39ab999fbe3a8a630e7af7e62d1eee2e9aaf1348723a5f6a9217b174f0c323a14f4f14890d41f2d7e2ddf523116763dc53a0b32560c6cfa8c5bdb1cfdb030e307da1838cf7ef4cc997897925f64a2c5d144bd264904550a572c6ad711693ea7b1b841943eb533a66186aa4698e4b2490943a5bd8075ee6b0c24e4b1571f7f6ee9d98eec676a8d5c05ecb7fe8322e862785478c794f69cd9c5322d0ff68b3d6e124820887705189a9831381e37fa1f18678e6254e6e80a7ce8a1cd965065fea6d48acfe2fb25a302a98b518abb992371eb99c7d47f9cfe96bef9bbaff1453fd20973446518bd3d11e53d76b8714e87d737bdf3b306753e138f27e79916da2ce54edcdedb975d49f2c77da894d0dd04d1a3e675c2e7f978bdbd7668de303192c7af8706a5ada50e8f0d6843aa3c36d7836e88930409c60bf03e0ae8a3e7c601e2b4678024efb5e91dc231007e1f7e637efd08b729d790b899944421680d917d590b0659cbb3406dc7d1eaa5b461aa7c979ed3eaeb09fb7fe1c4c5c00bd3862bfc8160f04f7aae671fcf1aecd54ea192f4a0ae2c3762ddc38e3a212008a24488a2ae98731a19cfcc4881c5fbe08a3696927b8ff7e853d3097ca1840c5fc4b49e881de5af9c82d76b5723821db4480e8d1a66084274d2811f038d017af68c4f0412893a783f476a538d84e43853a913a20afbb927614f1ddcd5641973f784713eb25d0498b9f9d66a82a4294262e661c67295bb4f43593d9d9e3bff30eb67e479981c7e9c6bf32333f0ac688f22e984cad4c4004e5382e3d4ed7e79add11f86eaa4464e2ff0e568153768fdbcfb26bce8692dc62f069c5cefa204122289ce5c9e0618b6a1b20d7f37e88044c38339fc746703fd3ae1ee583717e94d01f4c194e4908b901c7ac02829fe0ea318f12249c4f1378c92465ce7a8f37bab36e9857f859aceb8e7fbb557aa5c07d2b37f6d440a59e76bbfbd1f6fd92375eb9d0d4ac9de484abc23369e867a6b024bcaa54376fea8ccc3a32f127042777b083474d3c77d77f3f5f4a9df5fde25ef45fffd1874b17c6701010d35e44419c0b2f42edee781b4531b419e6767b775079d38aaf2a48aa540c0597ea20352532471c093c7e4079bfd649d4a69fd3f47298c89eb848b566532e4531b07f1baf2ea681880682957d44709666610bff4ba2bf4321e1fa65d21623a013566247ba45f4f97d2d652a237460ba1c663e64fb61fada7f366d22d41ed8e7889ac853cf45ee822f3b5ccc324ef0aa2e886fde7447f2cf83d2b991852181e952541cb196708f747ffb8232b7959b7b182fc46046b257c295667e8fd82a386e2be8c6df13ea1283ac111eb9d1660403672fe8c37ab0e1aa0feb7c6607c1c34a82d321e673f31c2579e2c6f737f08bd131ede7990129167dd831666bc1d26202c5787a2ee1847104ea242a1166015da1c1bdc022dc5dfbc927e657579fc444a04947270e358f913fdfc5f902da88bf05cdb560d5a76d5412508a154ff6ea33fd970cb8800cd49a383153b899ddf9faa239b865b7f3ed622bbc1930b33528d6e6bb583ed9559d49eecb7905e59bb26fbf3fb0cd0a61fcea1b17e339dc537f3954ffb0401858bb650980ed8e06b4ac089f96baddf76e95dee0b0b7880a088253d5d25cb5beb65be2dfd17c3163e5ea1480f7b8d56038165c5f26dbca08d593f88bd4edfebe8097e4805f7b206ef16394439ef3dc355718265ac74bd8553a1139a2125ca36a420f9100f61939c57eb0d38af68565b1c76e249b479e8f060aa0c9b046f05876d0cbdc85162029b018ad60d1ce1ae31fff5eafb8fbce64dfafdccd4983b8ab626a2b07cc9dc4843bdc4b96881a31aecdce6a4c4b940735d38fa6b2e206e4c9885d67e09b6f9d01fcbf26398e9b8d0a9adf01248a19c8aed0504e1a1b8597fca753ff0ca519aa915bf876ece0dd21c3b629df60c49de5b1a03997b7f7996fe5e23cb918e3579623b38c29b90e0b8f84449af173f3c1d992e459d2e14a4015d67d16151766e7434cf54e7928ba46ee5bf16165af04b1dbe2137a098a27e759f09fb62d1fd98c9c05ed8d464e14f21342fa207b6253b6ccae048dca4b2cee5747ab8b45aa458614181a942acb683a823b27a234cf14d3bfaabee6f09a25ef0346fc2256d29496c9d1369b961bd1e00b509f29389e71eb94b001ea411b8cba84f9f70a01e25bca1a784635b3e034697c8c16234bd507b81a2a9c0daf96195b3c1822b0ea9fc62e5b0e6dd41b77f4cfee8ddaa163e5b8ccc608c3cf21390ef705bbec2f40061ebe43da04d1adffebc945bac9054fc8349b60f231204d173637f4300945cb0f308a96f89c28e89d75bcfa459d5f90db797d7cd62a9dc027501ab41f81193539b5577a6370de54852af2b5ddda6a8840d37027f6822e256fe40275b7b18eab547a8dc7c17dc5e9b8c9d8a454629c904827bcc668595cb6ab4dc5423baba58584f33134c362a08659e1e7cc5eb6416a266b0d1e1e109cf7f09dc4e030e1739504a09115139098fb8191eeb4737f028ea6097050d2a6ca8421f0bfdec9e1371db8fdfd0c03a1658e94aa7096ca411f205ca997a26fa2676f55f2910cd6ce25b44cdb20e1df995cd12a8caeb0eddf90e575d754ad51190eaddbbee518556ea68df90be8e68611712ff2f729da25ab4adef901dd231389e19ef7839474a814f40d1c65f92f9cde7cb6c53167e6c20e638206a347c07a8832ebdaa46a86829305302c3b067f699540c74eb2dd155eee824dcf438df64ac3bef8600ab2ef6d21d9772d5a8e1173fef91b163d05d62be180ff7ff2604f67fb157de15229ce96911ba5839fcde079f48315c4a6cd4986d69d298946dcc4191d3591c0aa07ce4974cb68c11dae4a136c99c5a2378c20e192572299c68c73389d9a232368ebdf54399c12582295864e5ffd18a9241402c8ea5ca9616fba9b10817ba0bb8301c8424596c975e2bdafcd03dd32d79084cc347902f4c9208adba0c699e707199fe5bd1026638a1c9125e3fcbf2a8fbbba45b78e9734ffe4a098e870628cbcbd7c13c12fbd3d2ac31c4579493dd1c350f0209acb50d914d47023bb9a7e02d0106d800982e8f34834fe562e5ea3aad09a82e8513406faf8e9011f4338b689d635c899018e3e985c7d97680b1c71bed439506db8627191abc8bb7042943c10414e2145df71ac903ffa8958db90e3b2f3ae5c7f6be621e71ef10ca40b07b4aa65ef6adcda901bc6dee0b14034f761cabcb35fd598a3fd1c3c4145a4cc4191f9a9a4bd43d2704dab9d178e4df0fe7752ecfc0d4031e0c9e44a04e90defab1698566e665fbe7e7fd1ac92947dfdb117c582934f607e83bfcd247300dbc069fbddc09c80b5bda81e17a55a459e6c39c22b88e5ce1354cfaedc7d0a7d63dcbe80e12b3f9a7426fe9c4022ecf0a44a4dff07372d443654d04019d6c2758bf7e0b893d4646dc6feb08fada445c65fcd087ba89f7ed15b6f9a685ecaace24f6f3cfc7f59c5b2e846f7b20ff6d1df8730b458b970f00fee445c5d379a2990baf1fcbb693278adf882ac7f9df7a4e8585ebf5af141b924e3443303b33387caf3e10e7cbe575e24ef1261265e22257066495bdef36d42f4b9cb6cdddb1a6ce6fc13f3efd1d57fa2cd07721b2a66ca52b993c55ca826bf7ae925636fbd9dfd56f649167c68b516caa3e15d964d7417f562f262b0db3f23b7ed364b97f9287966bd9b3342d87f8a6198d549ec70dad2cd14385a2fae155cbd625804caa7de21dd7e2c065ce58464c5224cf0d1f6ff0280bbb3c9d72a053f42636e83980dafdd780125b5feaa8a38e5968bfb99c60c9472329fc51380345920924ff1a548de3f21672666ff82b23f548e7b960de27b6bc2d63c2e677c3b141b7a76de2ca1e4977ac7f793411566ed03d10df189780aa67f1a042fce8eca229938c3e385946277c8a3f2dcc22b11af393e662d265be821dde95284b95d58ea367613296c1f472344c3aeffd5a53925dc064809f52a48b1c4f21885b2c40b25ed5b2f8903c6f3223a955dcfd59df657f54a5ad1f39fb8275632872cc960070186268a0334b54e80bbf06aa71d26ba9a00828d421276e9d9b9aba50d0e0f9bdf600a3cd25628b210779955ca53c942c2909fd2a5b067cf6c7fde7ca36949d191a4f71316d52c0be8106066da523d887b8ef0d1de6534a0445b75c23d8b814dd999641a3bb8ce490d70329c9b92e42cb51eee4a5e094aa313dd9da0e88278688052b94e1a628aece8cf9f94cd0f82bbc5984269132e5f8ed54bb515f69a7832bb2368a15e1b604a702266fabcc392e327f987e9438129da28c795ac6e8561a9f30a98d8de8bf0f8da714d264ef413231bc28d7dd52962f116ba7587f7b946a54904105295318f53e96cb6eec3fee53ca92e6007af170b6beb7a9954b8b117472b4b497d5e953717732b374103eb20ce2be0a897a06156dabef6f55c49aa7a69bf53cbff6b1d3cd3c0c5ddaf94ded37f3e9c777c580ccce314da0b5ea2728a78bdb", "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"}) 10:31:23 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:23 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f436000000000000000001"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, 0x0) 10:31:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f436000000000000000001"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, 0x0) 10:31:24 executing program 5: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:24 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f436000000000000000001"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, 0x0) 10:31:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f436000000000000000001"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, 0x0) 10:31:24 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:24 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:24 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:24 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 5: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 1: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 5: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {0x0, 0x23000000}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:31:26 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:27 executing program 5: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:27 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:27 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:27 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:27 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:27 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:27 executing program 1: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:28 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 1: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 4: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:28 executing program 1: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:28 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:29 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:29 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:29 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:29 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:29 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:29 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:31:29 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:29 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:29 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:31:29 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:30 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:30 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:30 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:30 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:31:30 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:30 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:30 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:30 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:31 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:31 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:31 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:31 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:31 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:31 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:31 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:31 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:31 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:31 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:31 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:32 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:32 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:32 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:32 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:32 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:32 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:32 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:32 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:33 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:33 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, 0x0, 0x0) 10:31:33 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:33 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:33 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, 0x0, 0x0) 10:31:33 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:33 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, 0x0, 0x0) 10:31:33 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:33 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:33 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) 10:31:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:34 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) 10:31:34 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:34 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) 10:31:34 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:34 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:34 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:34 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:34 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:34 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:35 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:35 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:35 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:35 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:35 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:35 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:35 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:35 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:35 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:35 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:35 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:35 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:36 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:36 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:36 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:36 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:36 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:36 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:36 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:36 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:36 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:36 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, 0x0, 0x0) 10:31:36 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:36 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, 0x0, 0x0) 10:31:37 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, 0x0, 0x0) 10:31:37 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) 10:31:37 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) 10:31:37 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) 10:31:37 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:37 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:38 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 3: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:38 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x0, 0x2600}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:31:38 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:38 executing program 3: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x0, 0x2600}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:31:38 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:38 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:39 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:39 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:41 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:41 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:41 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:41 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:41 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:41 executing program 0: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:41 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:41 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:42 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 0: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:42 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 0: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:44 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 4: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 4: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 4: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 0: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 4: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 4: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 4: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 0: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x95ffffff00000000}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:31:48 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {0x0, 0x0, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {0x0, 0x0, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 2: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x1e00000000000000}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:31:49 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0x0, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:50 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {0x0, 0x0, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 0: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0x0, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:51 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {0x0, 0x0, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 3: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:52 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:52 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:52 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0x0, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:52 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:52 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:52 executing program 0: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:52 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:52 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 0: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0x0, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:53 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:54 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:54 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:54 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:54 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:54 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:54 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:54 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) close(r0) 10:31:54 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:55 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) close(r0) 10:31:55 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:55 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:55 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:55 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) close(r0) 10:31:55 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:55 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) close(r0) 10:31:55 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:55 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:55 executing program 3: 10:31:55 executing program 0: close(0xffffffffffffffff) 10:31:55 executing program 3: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x40000000, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) getgroups(0x0, 0x0) 10:31:55 executing program 0: close(0xffffffffffffffff) 10:31:56 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:56 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:56 executing program 0: close(0xffffffffffffffff) 10:31:56 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:56 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) 10:31:56 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:56 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:56 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:56 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) 10:31:56 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00\x00\xc3\x00', 0x40004002}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) 10:31:56 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) 10:31:56 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 10:31:56 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:57 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:57 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:57 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) close(0xffffffffffffffff) 10:31:57 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:57 executing program 1: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:57 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) close(0xffffffffffffffff) 10:31:57 executing program 3: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:31:57 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) close(0xffffffffffffffff) 10:31:57 executing program 1: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 1093.042643] ISOFS: Unable to identify CD-ROM format. 10:31:57 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:57 executing program 1: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r1, 0x0, 0x807fffff) [ 1093.275118] ISOFS: Unable to identify CD-ROM format. 10:31:57 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:57 executing program 3: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r2, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) futimesat(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0405405, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) 10:31:57 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:58 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r2, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 10:31:58 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:58 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:58 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:58 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 10:31:58 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:58 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:58 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:58 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 1094.132406] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.139119] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.193233] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.238875] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.269416] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.285626] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.305543] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.322870] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 10:31:58 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:58 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 1094.339812] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.363580] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.383167] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.408889] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 10:31:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', 0x0, 0x0, 0x0) 10:31:59 executing program 0: pipe(&(0x7f0000000380)={0xffffffffffffffff}) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/7, 0x7}], 0x1) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 10:31:59 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:59 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:59 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:59 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:59 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:59 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:59 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:59 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r0, 0x0, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/181, 0xb5}], 0x1) 10:31:59 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:59 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:32:00 executing program 3: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') getdents64(r0, &(0x7f0000000200)=""/116, 0x184) 10:32:00 executing program 0: syslog(0x3, &(0x7f0000000140)=""/197, 0xfffc) 10:32:00 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 10:32:00 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:00 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:00 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:00 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 10:32:00 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:00 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:00 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 10:32:00 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f00000008c0), 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup2(r1, r0) ioctl$sock_ifreq(r2, 0x8992, &(0x7f0000000600)={'gre0\x00', @ifru_hwaddr}) 10:32:00 executing program 3: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f00000000c0), 0x2c3) 10:32:00 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:00 executing program 1: 10:32:00 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:01 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:01 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f00000008c0), 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:01 executing program 3: 10:32:01 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:01 executing program 1: 10:32:01 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:01 executing program 3: 10:32:01 executing program 1: 10:32:01 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f00000008c0), 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:01 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:01 executing program 1: 10:32:01 executing program 3: 10:32:02 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:02 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:02 executing program 1: 10:32:02 executing program 3: 10:32:02 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f00000008c0), 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:02 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:02 executing program 3: 10:32:02 executing program 1: 10:32:02 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f00000008c0), 0x0) 10:32:02 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:02 executing program 1: 10:32:02 executing program 3: 10:32:03 executing program 1: 10:32:03 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:03 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:03 executing program 3: 10:32:03 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:03 executing program 1: 10:32:03 executing program 3: 10:32:03 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:03 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f00000008c0), 0x0) 10:32:03 executing program 3: 10:32:03 executing program 1: 10:32:03 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:03 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x4240a3c3) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 10:32:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='\x00 &X\v\x00\x00\x00\x00\x00\b') r1 = openat$cgroup_ro(r0, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x51}], 0x1, 0x20001003) 10:32:03 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) sendmmsg(r0, &(0x7f0000005f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000041) 10:32:03 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:03 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:03 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 10:32:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev_snmp6\x00') openat$cgroup_ro(r0, &(0x7f00000001c0)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX\x01\x00=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xccM\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r\x96\xcc\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xe6i\xcf\x15\xb3h\nw$\xb4>\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd', 0x0, 0x0) 10:32:04 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f00000008c0), 0x0) 10:32:04 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:05 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:05 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:05 executing program 2: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 0: futex(0x0, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:06 executing program 2: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 0: futex(0x0, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:06 executing program 2: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 0: futex(0x0, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:06 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 2: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 0: futex(&(0x7f0000000040), 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:06 executing program 2: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 0: futex(&(0x7f0000000040), 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:07 executing program 2: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 0: futex(&(0x7f0000000040), 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:07 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:07 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:07 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:08 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:08 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:08 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:08 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(0x0, 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:08 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(0x0, 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:09 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:09 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:10 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:10 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:10 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:10 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:10 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:10 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:10 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(0x0, 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:10 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:10 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:10 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:11 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:11 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:11 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:11 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:12 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:12 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:13 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:13 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:13 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:14 executing program 1: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 1: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 1: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 1: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:15 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 1: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 4: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:15 executing program 1: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:16 executing program 4: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:16 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 4: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:17 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 4: futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:17 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 4: futex(0x0, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:18 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 4: futex(0x0, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:18 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 4: futex(0x0, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:18 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 4: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:18 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 4: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:19 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 4: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:20 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 3: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 3: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 3: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 3: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 3: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 3: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 4: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:32:25 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0x0, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:26 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 4: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:32:32 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 1131.014432] IPVS: ftp: loaded support on port[0] = 21 [ 1131.215615] chnl_net:caif_netlink_parms(): no params data found [ 1131.253321] bridge0: port 1(bridge_slave_0) entered blocking state [ 1131.259734] bridge0: port 1(bridge_slave_0) entered disabled state [ 1131.266875] device bridge_slave_0 entered promiscuous mode [ 1131.276225] bridge0: port 2(bridge_slave_1) entered blocking state [ 1131.282659] bridge0: port 2(bridge_slave_1) entered disabled state [ 1131.289840] device bridge_slave_1 entered promiscuous mode [ 1131.458112] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1131.469762] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1131.488384] team0: Port device team_slave_0 added [ 1131.495295] team0: Port device team_slave_1 added [ 1131.553620] device hsr_slave_0 entered promiscuous mode [ 1131.591280] device hsr_slave_1 entered promiscuous mode [ 1131.817466] bridge0: port 2(bridge_slave_1) entered blocking state [ 1131.823887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1131.830447] bridge0: port 1(bridge_slave_0) entered blocking state [ 1131.837115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1132.039561] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1132.049599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1132.056926] bridge0: port 1(bridge_slave_0) entered disabled state [ 1132.067053] bridge0: port 2(bridge_slave_1) entered disabled state [ 1132.074851] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1132.086981] 8021q: adding VLAN 0 to HW filter on device team0 [ 1132.100249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1132.108543] bridge0: port 1(bridge_slave_0) entered blocking state [ 1132.114992] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1132.282839] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1132.290625] bridge0: port 2(bridge_slave_1) entered blocking state [ 1132.297052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1132.305391] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1132.314275] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1132.326153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1132.334772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1132.350076] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1132.360493] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1132.371780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1132.380461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1132.388378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1132.396255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1132.553396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1132.570628] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1132.593187] device bridge_slave_1 left promiscuous mode [ 1132.598756] bridge0: port 2(bridge_slave_1) entered disabled state 10:32:37 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:37 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:37 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:37 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:37 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:37 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) [ 1132.672068] device bridge_slave_0 left promiscuous mode [ 1132.677673] bridge0: port 1(bridge_slave_0) entered disabled state 10:32:37 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:37 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:38 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:38 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:38 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:38 executing program 5: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:38 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x0, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:38 executing program 0: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x0, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:38 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:39 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:39 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:39 executing program 5: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:39 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x0, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0x0, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:39 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:39 executing program 0: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x0, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:39 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x0, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:40 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:40 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:40 executing program 5: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:40 executing program 2: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x1f00000000000000, @tick, {}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:32:41 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:32:41 executing program 0: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x0, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:41 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x0, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:41 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0x0, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:41 executing program 4: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@mcast2, 0x0, 0x32}, 0x0, @in6=@loopback}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)={0x2, 0xd, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="021200001100000026bd7000fcdbdf2501001400790000000800120003000000000000003800000046003270b4a69956a98fe40000000000ac1414bb0000000000000000000400000000000000000000000000000000000004000400170000001f000000000700003f00000000000000030000000000120002000b00050000000100000000000000"], 0x88}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 10:32:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:41 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:41 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:42 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:42 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:42 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x0, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:42 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0x0, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:42 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:43 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:43 executing program 5: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x1000000, @tick, {}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:32:43 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:43 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x0, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:43 executing program 5: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x2200, @tick, {}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:32:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0x0, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:44 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:44 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:44 executing program 5: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0x0, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:44 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:44 executing program 1: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_normal='map=normal'}, {@utf8='utf8'}], [{@uid_eq={'uid'}}, {@euid_gt={'euid>'}}, {@euid_eq={'euid'}}, {@subj_role={'subj_role', 0x3d, 'ramfs\x00'}}]}) 10:32:44 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:45 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:45 executing program 4: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x2100000000000000, 0x0, @tick, {}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:32:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:45 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:45 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:45 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) 10:32:45 executing program 5: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:45 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x0, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:45 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) [ 1141.162706] JFS: Cannot determine volume size 10:32:45 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) [ 1141.517350] JFS: Cannot determine volume size 10:32:46 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:46 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) [ 1141.927994] JFS: Cannot determine volume size 10:32:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:46 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:46 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) 10:32:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:46 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:46 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:47 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) 10:32:47 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) 10:32:47 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:47 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) 10:32:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:48 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) 10:32:48 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:48 executing program 5: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:48 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:48 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) 10:32:48 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:48 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) [ 1144.424763] JFS: Cannot determine volume size 10:32:49 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:49 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:49 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:49 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:49 executing program 5: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:49 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:49 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:49 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:50 executing program 4: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x2200, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:32:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:50 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:50 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:51 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x8c02) write(r0, &(0x7f0000000000)="b63d06003f0004000000ed69d2bc7037cebc82c2de96aa0faeaa6f1602b9107d425db695bbe9cad006de5db6ec75d2e1", 0x30) ioctl$SG_GET_NUM_WAITING(r0, 0x5382, &(0x7f0000000080)) 10:32:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:51 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:51 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:51 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:52 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:52 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:52 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1148.533357] FAULT_INJECTION: forcing a failure. [ 1148.533357] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.651006] CPU: 1 PID: 18745 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1148.658387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1148.668629] Call Trace: [ 1148.671292] dump_stack+0x172/0x1f0 [ 1148.674998] should_fail.cold+0xa/0x1b [ 1148.678949] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1148.684082] ? lock_downgrade+0x810/0x810 [ 1148.688393] ? ___might_sleep+0x163/0x280 [ 1148.692579] __should_failslab+0x121/0x190 [ 1148.696841] should_failslab+0x9/0x14 [ 1148.700663] __kmalloc+0x2dc/0x740 [ 1148.704259] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1148.709819] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1148.715375] ? strnlen_user+0x1f0/0x280 [ 1148.719381] ? __x64_sys_memfd_create+0x13c/0x470 [ 1148.724255] __x64_sys_memfd_create+0x13c/0x470 [ 1148.729062] ? memfd_fcntl+0x1550/0x1550 [ 1148.733157] ? do_syscall_64+0x26/0x610 [ 1148.737155] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1148.741822] ? trace_hardirqs_on+0x67/0x230 [ 1148.746176] do_syscall_64+0x103/0x610 [ 1148.750129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1148.755339] RIP: 0033:0x457e29 [ 1148.758641] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1148.778802] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1148.786530] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1148.793819] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 10:32:53 executing program 5 (fault-call:8 fault-nth:0): mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 1148.801105] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1148.808394] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf11ff06d4 [ 1148.815690] R13: 00000000004c6757 R14: 00000000004dbd08 R15: 0000000000000003 [ 1148.995007] FAULT_INJECTION: forcing a failure. [ 1148.995007] name failslab, interval 1, probability 0, space 0, times 0 [ 1149.057470] CPU: 0 PID: 18750 Comm: syz-executor.5 Not tainted 5.0.0-rc8 #88 [ 1149.064710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.075311] Call Trace: [ 1149.077956] dump_stack+0x172/0x1f0 [ 1149.081647] should_fail.cold+0xa/0x1b [ 1149.085575] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1149.090695] ? lock_downgrade+0x810/0x810 [ 1149.094863] ? ___might_sleep+0x163/0x280 [ 1149.099036] __should_failslab+0x121/0x190 [ 1149.103288] should_failslab+0x9/0x14 [ 1149.107105] kmem_cache_alloc+0x2b2/0x6f0 [ 1149.111267] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1149.116838] ? apparmor_capable+0x2bb/0x5d0 [ 1149.121187] ? cap_capable+0x205/0x270 [ 1149.125096] getname_flags+0xd6/0x5b0 [ 1149.128943] user_path_mountpoint_at+0x29/0x50 [ 1149.133602] ksys_umount+0x164/0xe70 [ 1149.137344] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1149.142934] ? fput+0x128/0x1a0 [ 1149.146232] ? ksys_write+0x166/0x1f0 [ 1149.150049] ? __detach_mounts+0x320/0x320 [ 1149.154364] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1149.159132] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1149.163902] ? do_syscall_64+0x26/0x610 [ 1149.167943] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.174486] ? do_syscall_64+0x26/0x610 [ 1149.178473] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1149.183133] __x64_sys_umount+0x54/0x80 [ 1149.187126] do_syscall_64+0x103/0x610 [ 1149.191035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.196231] RIP: 0033:0x457e29 [ 1149.199434] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1149.218347] RSP: 002b:00007fd14e8dfc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1149.226066] RAX: ffffffffffffffda RBX: 00007fd14e8dfc90 RCX: 0000000000457e29 [ 1149.233345] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 1149.240622] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1149.248076] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd14e8e06d4 [ 1149.255354] R13: 00000000004c6c24 R14: 00000000004dc398 R15: 0000000000000005 10:32:53 executing program 2 (fault-call:9 fault-nth:0): mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:53 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:53 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:53 executing program 1 (fault-call:0 fault-nth:0): futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1149.488978] FAULT_INJECTION: forcing a failure. [ 1149.488978] name fail_futex, interval 1, probability 0, space 0, times 1 [ 1149.505125] CPU: 0 PID: 18762 Comm: syz-executor.1 Not tainted 5.0.0-rc8 #88 [ 1149.512345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.521708] Call Trace: [ 1149.524324] dump_stack+0x172/0x1f0 [ 1149.527991] should_fail.cold+0xa/0x1b [ 1149.531937] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1149.537157] ? _kstrtoul+0x170/0x170 [ 1149.540977] ? get_pid_task+0xd4/0x190 [ 1149.544955] get_futex_key+0xb9a/0x1690 [ 1149.548979] ? lock_downgrade+0x810/0x810 [ 1149.553149] ? futex_lock_pi_atomic+0x2e0/0x2e0 [ 1149.557861] ? kasan_check_read+0x11/0x20 [ 1149.562043] do_futex+0x949/0x1d50 [ 1149.565604] ? find_held_lock+0x35/0x130 [ 1149.569692] ? exit_robust_list+0x290/0x290 [ 1149.574106] ? lock_downgrade+0x810/0x810 [ 1149.579587] ? kasan_check_write+0x14/0x20 [ 1149.583843] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1149.588835] ? wait_for_completion+0x440/0x440 [ 1149.593437] ? __sb_end_write+0xd9/0x110 [ 1149.597525] __x64_sys_futex+0x3f7/0x590 [ 1149.601615] ? do_futex+0x1d50/0x1d50 [ 1149.605504] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1149.610279] ? do_syscall_64+0x26/0x610 [ 1149.614274] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.619659] ? do_syscall_64+0x26/0x610 [ 1149.623653] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1149.628367] ? trace_hardirqs_on+0x67/0x230 [ 1149.632721] do_syscall_64+0x103/0x610 [ 1149.636635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.641840] RIP: 0033:0x457e29 [ 1149.645052] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1149.663971] RSP: 002b:00007f9dc803fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1149.671775] RAX: ffffffffffffffda RBX: 00007f9dc803fc90 RCX: 0000000000457e29 [ 1149.680339] RDX: 0000000000000000 RSI: 0000800000000005 RDI: 000000002000cffc 10:32:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:54 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 1149.687621] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1149.694904] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9dc80406d4 [ 1149.702221] R13: 00000000004be69a R14: 00000000004cf228 R15: 0000000000000003 [ 1149.726013] FAULT_INJECTION: forcing a failure. [ 1149.726013] name failslab, interval 1, probability 0, space 0, times 0 [ 1149.768070] FAULT_INJECTION: forcing a failure. [ 1149.768070] name failslab, interval 1, probability 0, space 0, times 0 [ 1149.783367] CPU: 1 PID: 18760 Comm: syz-executor.2 Not tainted 5.0.0-rc8 #88 [ 1149.790645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.790652] Call Trace: [ 1149.790686] dump_stack+0x172/0x1f0 [ 1149.790713] should_fail.cold+0xa/0x1b [ 1149.810190] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1149.815322] ? lock_downgrade+0x810/0x810 [ 1149.819493] ? ___might_sleep+0x163/0x280 [ 1149.819513] __should_failslab+0x121/0x190 [ 1149.819533] should_failslab+0x9/0x14 [ 1149.819549] kmem_cache_alloc+0x2b2/0x6f0 [ 1149.819565] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1149.819580] ? apparmor_capable+0x2bb/0x5d0 [ 1149.819596] ? cap_capable+0x205/0x270 [ 1149.850052] getname_flags+0xd6/0x5b0 [ 1149.853877] user_path_mountpoint_at+0x29/0x50 [ 1149.858638] ksys_umount+0x164/0xe70 [ 1149.862384] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1149.867963] ? fput+0x128/0x1a0 [ 1149.871268] ? ksys_write+0x166/0x1f0 [ 1149.875209] ? __detach_mounts+0x320/0x320 [ 1149.880550] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1149.885386] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1149.890166] ? do_syscall_64+0x26/0x610 [ 1149.894165] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.899558] ? do_syscall_64+0x26/0x610 [ 1149.903555] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1149.908168] __x64_sys_umount+0x54/0x80 [ 1149.912163] do_syscall_64+0x103/0x610 [ 1149.916076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.921296] RIP: 0033:0x457e29 [ 1149.924525] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1149.943660] RSP: 002b:00007fee3bb39c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1149.951402] RAX: ffffffffffffffda RBX: 00007fee3bb39c90 RCX: 0000000000457e29 [ 1149.958706] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 10:32:54 executing program 1 (fault-call:0 fault-nth:1): futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1149.965993] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1149.973278] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee3bb3a6d4 [ 1149.981574] R13: 00000000004c6c24 R14: 00000000004dc398 R15: 0000000000000005 [ 1150.017286] CPU: 0 PID: 18766 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1150.024508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1150.024514] Call Trace: [ 1150.024537] dump_stack+0x172/0x1f0 [ 1150.024562] should_fail.cold+0xa/0x1b [ 1150.044219] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1150.049345] ? lock_downgrade+0x810/0x810 [ 1150.053517] ? ___might_sleep+0x163/0x280 [ 1150.053537] __should_failslab+0x121/0x190 [ 1150.053573] ? shmem_destroy_callback+0xc0/0xc0 [ 1150.053590] should_failslab+0x9/0x14 [ 1150.053605] kmem_cache_alloc+0x2b2/0x6f0 [ 1150.053621] ? __alloc_fd+0x430/0x530 [ 1150.053639] ? shmem_destroy_callback+0xc0/0xc0 [ 1150.053655] shmem_alloc_inode+0x1c/0x50 [ 1150.053671] alloc_inode+0x66/0x190 [ 1150.053685] new_inode_pseudo+0x19/0xf0 [ 1150.053699] new_inode+0x1f/0x40 [ 1150.053714] shmem_get_inode+0x84/0x780 [ 1150.053736] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1150.053755] shmem_file_setup+0x66/0x90 [ 1150.067972] FAULT_INJECTION: forcing a failure. [ 1150.067972] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1150.070799] __x64_sys_memfd_create+0x2a2/0x470 [ 1150.070819] ? memfd_fcntl+0x1550/0x1550 [ 1150.070834] ? do_syscall_64+0x26/0x610 [ 1150.070852] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1150.133050] ? trace_hardirqs_on+0x67/0x230 [ 1150.133071] do_syscall_64+0x103/0x610 [ 1150.133093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1150.133107] RIP: 0033:0x457e29 [ 1150.133121] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1150.146131] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1150.146146] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1150.146155] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1150.146164] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1150.146180] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf11ff06d4 [ 1150.146189] R13: 00000000004c6757 R14: 00000000004dbd08 R15: 0000000000000003 [ 1150.225592] CPU: 1 PID: 18773 Comm: syz-executor.1 Not tainted 5.0.0-rc8 #88 [ 1150.232810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1150.242177] Call Trace: [ 1150.244790] dump_stack+0x172/0x1f0 [ 1150.248569] should_fail.cold+0xa/0x1b [ 1150.252489] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1150.257621] ? _kstrtoul+0x170/0x170 [ 1150.261356] ? get_pid_task+0xd4/0x190 [ 1150.265277] get_futex_key+0x233/0x1690 [ 1150.269291] ? lock_downgrade+0x810/0x810 [ 1150.273537] ? futex_lock_pi_atomic+0x2e0/0x2e0 [ 1150.278294] ? kasan_check_read+0x11/0x20 [ 1150.282471] do_futex+0x949/0x1d50 [ 1150.287113] ? find_held_lock+0x35/0x130 [ 1150.291319] ? exit_robust_list+0x290/0x290 [ 1150.295658] ? lock_downgrade+0x810/0x810 [ 1150.299839] ? kasan_check_write+0x14/0x20 [ 1150.304101] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1150.308990] ? wait_for_completion+0x440/0x440 [ 1150.313596] ? __sb_end_write+0xd9/0x110 [ 1150.317690] __x64_sys_futex+0x3f7/0x590 [ 1150.321783] ? do_futex+0x1d50/0x1d50 [ 1150.325600] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1150.330399] ? do_syscall_64+0x26/0x610 [ 1150.334390] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1150.339775] ? do_syscall_64+0x26/0x610 [ 1150.343786] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1150.348427] ? trace_hardirqs_on+0x67/0x230 [ 1150.352776] do_syscall_64+0x103/0x610 [ 1150.356701] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1150.361907] RIP: 0033:0x457e29 [ 1150.365148] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1150.384067] RSP: 002b:00007f9dc803fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1150.392750] RAX: ffffffffffffffda RBX: 00007f9dc803fc90 RCX: 0000000000457e29 [ 1150.400295] RDX: 0000000000000000 RSI: 0000800000000005 RDI: 000000002000cffc [ 1150.407596] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 10:32:54 executing program 2 (fault-call:9 fault-nth:1): mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:54 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 1150.415040] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9dc80406d4 [ 1150.422325] R13: 00000000004be69a R14: 00000000004cf228 R15: 0000000000000003 10:32:55 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1150.644124] FAULT_INJECTION: forcing a failure. [ 1150.644124] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1150.655989] CPU: 0 PID: 18784 Comm: syz-executor.2 Not tainted 5.0.0-rc8 #88 [ 1150.663196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1150.672569] Call Trace: [ 1150.675195] dump_stack+0x172/0x1f0 [ 1150.678861] should_fail.cold+0xa/0x1b [ 1150.682891] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1150.689128] should_fail_alloc_page+0x50/0x60 [ 1150.693674] __alloc_pages_nodemask+0x1a1/0x710 [ 1150.698369] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1150.703408] ? find_held_lock+0x35/0x130 [ 1150.707510] cache_grow_begin+0x9c/0x8c0 [ 1150.711599] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1150.717164] ? check_preemption_disabled+0x48/0x290 [ 1150.722338] kmem_cache_alloc+0x62d/0x6f0 [ 1150.726509] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1150.732070] ? apparmor_capable+0x2bb/0x5d0 [ 1150.736425] getname_flags+0xd6/0x5b0 [ 1150.740260] user_path_mountpoint_at+0x29/0x50 [ 1150.744872] ksys_umount+0x164/0xe70 [ 1150.748634] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1150.754202] ? fput+0x128/0x1a0 [ 1150.757509] ? ksys_write+0x166/0x1f0 [ 1150.761333] ? __detach_mounts+0x320/0x320 [ 1150.765616] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1150.770393] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1150.775181] ? do_syscall_64+0x26/0x610 [ 1150.779193] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1150.784581] ? do_syscall_64+0x26/0x610 [ 1150.789785] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1150.794398] __x64_sys_umount+0x54/0x80 [ 1150.798396] do_syscall_64+0x103/0x610 [ 1150.802318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1150.807525] RIP: 0033:0x457e29 [ 1150.810738] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1150.829744] RSP: 002b:00007fee3bb5ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1150.829760] RAX: ffffffffffffffda RBX: 00007fee3bb5ac90 RCX: 0000000000457e29 [ 1150.829769] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 1150.829778] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1150.829787] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee3bb5b6d4 [ 1150.829795] R13: 00000000004c6c24 R14: 00000000004dc398 R15: 0000000000000005 10:32:55 executing program 1: futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1150.975423] FAULT_INJECTION: forcing a failure. [ 1150.975423] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1150.987691] CPU: 1 PID: 18790 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1150.996124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1151.005487] Call Trace: [ 1151.008103] dump_stack+0x172/0x1f0 [ 1151.011758] should_fail.cold+0xa/0x1b [ 1151.015666] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1151.020798] ? mark_held_locks+0x100/0x100 [ 1151.025065] should_fail_alloc_page+0x50/0x60 [ 1151.029646] __alloc_pages_nodemask+0x1a1/0x710 [ 1151.034341] ? find_held_lock+0x35/0x130 [ 1151.038430] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1151.043479] cache_grow_begin+0x9c/0x8c0 [ 1151.047561] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1151.053124] ? check_preemption_disabled+0x48/0x290 [ 1151.058166] kmem_cache_alloc+0x62d/0x6f0 [ 1151.062452] ? shmem_destroy_callback+0xc0/0xc0 [ 1151.067142] shmem_alloc_inode+0x1c/0x50 [ 1151.071227] alloc_inode+0x66/0x190 [ 1151.074872] new_inode_pseudo+0x19/0xf0 [ 1151.078867] new_inode+0x1f/0x40 [ 1151.082253] shmem_get_inode+0x84/0x780 [ 1151.086251] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1151.091120] shmem_file_setup+0x66/0x90 [ 1151.096063] __x64_sys_memfd_create+0x2a2/0x470 [ 1151.100758] ? memfd_fcntl+0x1550/0x1550 [ 1151.104840] ? do_syscall_64+0x26/0x610 [ 1151.108831] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1151.113431] ? trace_hardirqs_on+0x67/0x230 [ 1151.117774] do_syscall_64+0x103/0x610 [ 1151.121693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1151.126903] RIP: 0033:0x457e29 [ 1151.130142] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1151.149108] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1151.156833] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1151.164114] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 10:32:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:32:55 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x2) [ 1151.171396] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1151.178686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf11ff06d4 [ 1151.185985] R13: 00000000004c6757 R14: 00000000004dbd08 R15: 0000000000000003 10:32:55 executing program 1: futex(&(0x7f000000cffc)=0x10, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:55 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:55 executing program 2 (fault-call:9 fault-nth:2): mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:55 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:56 executing program 1: futex(&(0x7f000000cffc)=0x1f00, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:56 executing program 0: [ 1151.490089] FAULT_INJECTION: forcing a failure. [ 1151.490089] name failslab, interval 1, probability 0, space 0, times 0 [ 1151.580389] CPU: 0 PID: 18808 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1151.587618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1151.596974] Call Trace: [ 1151.599576] dump_stack+0x172/0x1f0 [ 1151.603246] should_fail.cold+0xa/0x1b [ 1151.607153] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1151.612283] ? lock_downgrade+0x810/0x810 [ 1151.616454] ? ___might_sleep+0x163/0x280 [ 1151.620620] __should_failslab+0x121/0x190 [ 1151.624862] should_failslab+0x9/0x14 [ 1151.628689] kmem_cache_alloc+0x2b2/0x6f0 [ 1151.632866] __alloc_file+0x27/0x300 [ 1151.636589] alloc_empty_file+0x72/0x170 [ 1151.640666] alloc_file+0x5e/0x4d0 [ 1151.644219] alloc_file_pseudo+0x189/0x280 [ 1151.648474] ? alloc_file+0x4d0/0x4d0 [ 1151.648495] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1151.648514] ? kasan_check_write+0x14/0x20 [ 1151.648535] __shmem_file_setup.part.0+0x108/0x2b0 [ 1151.648555] shmem_file_setup+0x66/0x90 [ 1151.648579] __x64_sys_memfd_create+0x2a2/0x470 [ 1151.648596] ? memfd_fcntl+0x1550/0x1550 [ 1151.657935] ? do_syscall_64+0x26/0x610 [ 1151.657953] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1151.657969] ? trace_hardirqs_on+0x67/0x230 [ 1151.657989] do_syscall_64+0x103/0x610 [ 1151.658009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1151.658021] RIP: 0033:0x457e29 [ 1151.658036] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:32:56 executing program 0: [ 1151.658048] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1151.731584] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1151.739030] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1151.746298] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1151.753566] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf11ff06d4 [ 1151.760839] R13: 00000000004c6757 R14: 00000000004dbd08 R15: 0000000000000003 10:32:56 executing program 1: futex(&(0x7f000000cffc)=0x4000, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:56 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1151.784782] FAULT_INJECTION: forcing a failure. [ 1151.784782] name failslab, interval 1, probability 0, space 0, times 0 10:32:56 executing program 0: getpgid(0xffffffffffffffff) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/uts\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) [ 1151.873642] FAULT_INJECTION: forcing a failure. [ 1151.873642] name failslab, interval 1, probability 0, space 0, times 0 [ 1151.881063] CPU: 1 PID: 18822 Comm: syz-executor.2 Not tainted 5.0.0-rc8 #88 [ 1151.892071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1151.892077] Call Trace: [ 1151.892101] dump_stack+0x172/0x1f0 [ 1151.892121] should_fail.cold+0xa/0x1b [ 1151.892140] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1151.892157] ? lock_downgrade+0x810/0x810 [ 1151.892193] ? ___might_sleep+0x163/0x280 [ 1151.892212] __should_failslab+0x121/0x190 [ 1151.892231] should_failslab+0x9/0x14 [ 1151.892248] kmem_cache_alloc_trace+0x2d1/0x760 [ 1151.892264] ? mutex_trylock+0x1e0/0x1e0 [ 1151.892279] ? kasan_check_write+0x14/0x20 [ 1151.892303] kobject_uevent_env+0x2fb/0x1030 [ 1151.892321] ? wait_for_completion+0x440/0x440 [ 1151.892342] kobject_uevent+0x20/0x26 [ 1151.892451] device_del+0x6c5/0xb60 [ 1151.892472] ? __device_links_no_driver+0x270/0x270 [ 1151.929816] ? mntput+0x74/0xa0 [ 1151.929835] ? simple_release_fs+0xa1/0xd0 [ 1151.929865] device_unregister+0x15/0x30 [ 1151.929880] bdi_unregister+0x41c/0x5e0 [ 1151.951080] ? wb_blkcg_offline+0x120/0x120 [ 1151.951097] ? refcount_inc_checked+0x70/0x70 [ 1151.951114] ? lock_downgrade+0x810/0x810 [ 1151.951127] ? lock_downgrade+0x810/0x810 [ 1151.951147] bdi_put+0x151/0x180 [ 1151.951167] generic_shutdown_super+0x2b2/0x370 [ 1151.951184] kill_anon_super+0x3e/0x60 [ 1151.951256] fuse_kill_sb_anon+0x1e/0x30 [ 1151.951275] deactivate_locked_super+0x9a/0x100 [ 1151.951306] deactivate_super+0x1bd/0x1e0 [ 1151.951323] ? mount_ns+0x1d0/0x1d0 [ 1151.951355] ? dput+0x38/0x6a0 [ 1152.032968] ? dput+0x1e6/0x6a0 [ 1152.036271] cleanup_mnt+0xbf/0x160 [ 1152.039901] __cleanup_mnt+0x16/0x20 [ 1152.043626] task_work_run+0x14a/0x1c0 [ 1152.047529] exit_to_usermode_loop+0x273/0x2c0 [ 1152.052157] do_syscall_64+0x52d/0x610 [ 1152.056058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1152.061261] RIP: 0033:0x457e29 [ 1152.064475] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1152.083382] RSP: 002b:00007fee3baf7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1152.091100] RAX: 0000000000000000 RBX: 00007fee3baf7c90 RCX: 0000000000457e29 [ 1152.098823] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 1152.106107] RBP: 000000000073c0e0 R08: 0000000000000000 R09: 0000000000000000 [ 1152.113388] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee3baf86d4 [ 1152.120660] R13: 00000000004c6c24 R14: 00000000004dc398 R15: 0000000000000004 [ 1152.128451] CPU: 0 PID: 18829 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1152.135667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1152.145018] Call Trace: [ 1152.147620] dump_stack+0x172/0x1f0 [ 1152.151266] should_fail.cold+0xa/0x1b [ 1152.151286] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1152.151303] ? lock_downgrade+0x810/0x810 [ 1152.151322] ? ___might_sleep+0x163/0x280 [ 1152.151341] __should_failslab+0x121/0x190 [ 1152.151359] should_failslab+0x9/0x14 [ 1152.151375] kmem_cache_alloc_trace+0x2d1/0x760 [ 1152.151389] ? ___might_sleep+0x163/0x280 [ 1152.151407] ? __might_sleep+0x95/0x190 [ 1152.151429] apparmor_file_alloc_security+0x112/0x940 [ 1152.151451] security_file_alloc+0x69/0xb0 [ 1152.151470] __alloc_file+0xac/0x300 [ 1152.151488] alloc_empty_file+0x72/0x170 [ 1152.151506] alloc_file+0x5e/0x4d0 [ 1152.160512] alloc_file_pseudo+0x189/0x280 [ 1152.160532] ? alloc_file+0x4d0/0x4d0 [ 1152.160554] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1152.160573] ? kasan_check_write+0x14/0x20 [ 1152.160595] __shmem_file_setup.part.0+0x108/0x2b0 [ 1152.160616] shmem_file_setup+0x66/0x90 [ 1152.160637] __x64_sys_memfd_create+0x2a2/0x470 [ 1152.160655] ? memfd_fcntl+0x1550/0x1550 [ 1152.160671] ? do_syscall_64+0x26/0x610 [ 1152.160686] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1152.160702] ? trace_hardirqs_on+0x67/0x230 [ 1152.160721] do_syscall_64+0x103/0x610 [ 1152.160742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1152.160754] RIP: 0033:0x457e29 [ 1152.160768] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1152.160775] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1152.160789] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1152.160798] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1152.160810] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 10:32:56 executing program 1: futex(&(0x7f000000cffc)=0x60ff, 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1152.169091] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf11ff06d4 [ 1152.169101] R13: 00000000004c6757 R14: 00000000004dbd08 R15: 0000000000000003 10:32:56 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x1000000) 10:32:56 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:56 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) [ 1152.501185] FAULT_INJECTION: forcing a failure. [ 1152.501185] name failslab, interval 1, probability 0, space 0, times 0 [ 1152.530928] CPU: 1 PID: 18845 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1152.538170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1152.547527] Call Trace: [ 1152.550134] dump_stack+0x172/0x1f0 [ 1152.553815] should_fail.cold+0xa/0x1b [ 1152.557745] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1152.562913] ? lock_downgrade+0x810/0x810 [ 1152.567081] ? ___might_sleep+0x163/0x280 [ 1152.567101] __should_failslab+0x121/0x190 [ 1152.567122] should_failslab+0x9/0x14 [ 1152.579324] kmem_cache_alloc_trace+0x2d1/0x760 [ 1152.584034] ? ___might_sleep+0x163/0x280 [ 1152.584054] ? __might_sleep+0x95/0x190 [ 1152.584074] apparmor_file_alloc_security+0x112/0x940 10:32:57 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:57 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffd) mmap(&(0x7f00006fc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000140)='\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) 10:32:57 executing program 1: futex(&(0x7f000000cffc)=0x7400, 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1152.592190] security_file_alloc+0x69/0xb0 [ 1152.592210] __alloc_file+0xac/0x300 [ 1152.592229] alloc_empty_file+0x72/0x170 [ 1152.592248] alloc_file+0x5e/0x4d0 [ 1152.592268] alloc_file_pseudo+0x189/0x280 [ 1152.592286] ? alloc_file+0x4d0/0x4d0 [ 1152.592308] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1152.592326] ? kasan_check_write+0x14/0x20 [ 1152.592348] __shmem_file_setup.part.0+0x108/0x2b0 [ 1152.592367] shmem_file_setup+0x66/0x90 [ 1152.639940] __x64_sys_memfd_create+0x2a2/0x470 [ 1152.644623] ? memfd_fcntl+0x1550/0x1550 [ 1152.648707] ? do_syscall_64+0x26/0x610 [ 1152.652704] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1152.657298] ? trace_hardirqs_on+0x67/0x230 [ 1152.661640] do_syscall_64+0x103/0x610 [ 1152.665545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1152.670735] RIP: 0033:0x457e29 [ 1152.673939] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1152.692854] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1152.701104] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1152.708389] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1152.715663] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1152.722952] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf11ff06d4 [ 1152.730225] R13: 00000000004c6757 R14: 00000000004dbd08 R15: 0000000000000003 [ 1152.758250] [ 1152.759922] ====================================================== [ 1152.766235] WARNING: possible circular locking dependency detected [ 1152.772547] 5.0.0-rc8 #88 Not tainted [ 1152.776341] ------------------------------------------------------ [ 1152.782664] syz-executor.0/18851 is trying to acquire lock: [ 1152.788373] 000000008c69bf19 (&sb->s_type->i_mutex_key#12){+.+.}, at: shmem_fallocate+0x15a/0xc60 [ 1152.797869] [ 1152.797869] but task is already holding lock: [ 1152.803833] 00000000fa16793b (ashmem_mutex){+.+.}, at: ashmem_shrink_scan+0x66/0x4f0 [ 1152.811839] [ 1152.811839] which lock already depends on the new lock. [ 1152.811839] [ 1152.820144] [ 1152.820144] the existing dependency chain (in reverse order) is: [ 1152.827760] [ 1152.827760] -> #2 (ashmem_mutex){+.+.}: [ 1152.833224] __mutex_lock+0xf7/0x1310 [ 1152.837547] mutex_lock_nested+0x16/0x20 [ 1152.842136] ashmem_mmap+0x55/0x520 [ 1152.846305] mmap_region+0xc37/0x1760 [ 1152.850627] do_mmap+0x8e2/0x1080 [ 1152.854600] vm_mmap_pgoff+0x1c5/0x230 10:32:57 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1152.859017] ksys_mmap_pgoff+0x4aa/0x630 [ 1152.863645] __x64_sys_mmap+0xe9/0x1b0 [ 1152.868064] do_syscall_64+0x103/0x610 [ 1152.872484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1152.878196] [ 1152.878196] -> #1 (&mm->mmap_sem){++++}: [ 1152.883769] down_read+0x3b/0x90 [ 1152.887739] __do_page_fault+0x9c2/0xd60 [ 1152.892341] do_page_fault+0x71/0x581 [ 1152.896999] page_fault+0x1e/0x30 [ 1152.900979] iov_iter_fault_in_readable+0x1ba/0x450 [ 1152.906559] generic_perform_write+0x195/0x530 [ 1152.911689] __generic_file_write_iter+0x25e/0x630 [ 1152.917143] generic_file_write_iter+0x360/0x610 [ 1152.922417] __vfs_write+0x613/0x8e0 [ 1152.926653] vfs_write+0x20c/0x580 [ 1152.930724] ksys_write+0xea/0x1f0 [ 1152.934727] kobject: 'vlan0' (000000006f1e10ed): kobject_uevent_env [ 1152.934790] __x64_sys_write+0x73/0xb0 [ 1152.941742] kobject: 'vlan0' (000000006f1e10ed): kobject_uevent_env: attempted to send uevent without kset! [ 1152.946044] do_syscall_64+0x103/0x610 [ 1152.946059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1152.946064] [ 1152.946064] -> #0 (&sb->s_type->i_mutex_key#12){+.+.}: [ 1152.946095] lock_acquire+0x16f/0x3f0 [ 1152.956787] kobject: 'mesh' (000000008a58d404): kobject_cleanup, parent (null) [ 1152.960365] down_write+0x38/0x90 [ 1152.960379] shmem_fallocate+0x15a/0xc60 [ 1152.960394] ashmem_shrink_scan+0x1d7/0x4f0 [ 1152.960408] ashmem_ioctl+0x2f0/0x11a0 [ 1152.966400] kobject: 'mesh' (000000008a58d404): calling ktype release [ 1152.972892] do_vfs_ioctl+0xd6e/0x1390 [ 1152.972903] ksys_ioctl+0xab/0xd0 [ 1152.972926] __x64_sys_ioctl+0x73/0xb0 [ 1152.972939] do_syscall_64+0x103/0x610 [ 1152.972952] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1152.972956] [ 1152.972956] other info that might help us debug this: [ 1152.972956] [ 1152.972959] Chain exists of: [ 1152.972959] &sb->s_type->i_mutex_key#12 --> &mm->mmap_sem --> ashmem_mutex [ 1152.972959] [ 1152.978733] kobject: (000000008a58d404): dynamic_kobj_release [ 1152.985503] Possible unsafe locking scenario: [ 1152.985503] [ 1152.985507] CPU0 CPU1 [ 1152.985510] ---- ---- [ 1152.985512] lock(ashmem_mutex); [ 1152.985520] lock(&mm->mmap_sem); [ 1152.985527] lock(ashmem_mutex); [ 1152.985534] lock(&sb->s_type->i_mutex_key#12); [ 1152.985543] [ 1152.985543] *** DEADLOCK *** [ 1152.985543] [ 1152.985551] 1 lock held by syz-executor.0/18851: [ 1152.985554] #0: 00000000fa16793b (ashmem_mutex){+.+.}, at: ashmem_shrink_scan+0x66/0x4f0 [ 1152.985578] [ 1152.985578] stack backtrace: [ 1152.985590] CPU: 1 PID: 18851 Comm: syz-executor.0 Not tainted 5.0.0-rc8 #88 [ 1152.985600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1152.989887] kobject: 'mesh': free name [ 1152.994122] Call Trace: [ 1152.994154] dump_stack+0x172/0x1f0 [ 1152.994173] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1152.994187] __lock_acquire+0x2f00/0x4700 [ 1152.994199] ? mark_held_locks+0x100/0x100 [ 1152.994219] ? mark_held_locks+0x100/0x100 [ 1152.999285] kobject: 'vlan0' (000000006f1e10ed): kobject_cleanup, parent (null) [ 1153.004239] ? _raw_spin_unlock_irq+0x28/0x90 [ 1153.004254] ? finish_task_switch+0x146/0x790 [ 1153.004266] ? _raw_spin_unlock_irq+0x28/0x90 [ 1153.004291] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1153.004387] ? snd_hda_gen_parse_auto_config+0x5f00/0xc2a0 [ 1153.004404] lock_acquire+0x16f/0x3f0 [ 1153.011223] kobject: 'vlan0' (000000006f1e10ed): calling ktype release [ 1153.015393] ? shmem_fallocate+0x15a/0xc60 [ 1153.015412] down_write+0x38/0x90 [ 1153.015425] ? shmem_fallocate+0x15a/0xc60 [ 1153.015440] shmem_fallocate+0x15a/0xc60 [ 1153.019522] kobject: (000000006f1e10ed): dynamic_kobj_release [ 1153.023822] ? ___might_sleep+0x163/0x280 [ 1153.023842] ? shmem_setattr+0xc80/0xc80 [ 1153.023857] ? lock_pi_update_atomic+0x120/0x120 [ 1153.023870] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1153.023884] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 1153.023899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1153.028538] kobject: 'vlan0': free name [ 1153.033998] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 1153.034014] ? lock_acquire+0x16f/0x3f0 [ 1153.034029] ? ashmem_shrink_scan+0x66/0x4f0 [ 1153.034046] ? mutex_trylock+0x18e/0x1e0 [ 1153.034066] ashmem_shrink_scan+0x1d7/0x4f0 [ 1153.283087] ashmem_ioctl+0x2f0/0x11a0 [ 1153.287008] ? ashmem_shrink_scan+0x4f0/0x4f0 [ 1153.291503] ? __fget+0x340/0x540 [ 1153.294972] ? find_held_lock+0x35/0x130 [ 1153.299540] ? ashmem_shrink_scan+0x4f0/0x4f0 [ 1153.304047] do_vfs_ioctl+0xd6e/0x1390 [ 1153.307947] ? ioctl_preallocate+0x210/0x210 [ 1153.312355] ? __fget+0x367/0x540 [ 1153.315812] ? iterate_fd+0x360/0x360 [ 1153.319702] ? nsecs_to_jiffies+0x30/0x30 [ 1153.323926] ? security_file_ioctl+0x93/0xc0 [ 1153.328353] ksys_ioctl+0xab/0xd0 [ 1153.331817] __x64_sys_ioctl+0x73/0xb0 [ 1153.335716] do_syscall_64+0x103/0x610 [ 1153.339612] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1153.344817] RIP: 0033:0x457e29 [ 1153.348012] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1153.366924] RSP: 002b:00007f2463532c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1153.374633] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 1153.381903] RDX: 0000000000000000 RSI: 000000000000770a RDI: 0000000000000003 [ 1153.389182] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1153.396927] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24635336d4 [ 1153.404196] R13: 00000000004bf0a2 R14: 00000000004d0a40 R15: 00000000ffffffff 10:32:57 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffd) mmap(&(0x7f00006fc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000140)='\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) [ 1153.413460] kobject: '0:47' (0000000098d9ac20): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1153.429031] kobject: '0:47' (0000000098d9ac20): kobject_uevent_env [ 1153.440460] kobject: '0:47' (0000000098d9ac20): fill_kobj_path: path = '/devices/virtual/bdi/0:47' 10:32:58 executing program 1: futex(&(0x7f000000cffc)=0x9400, 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1153.488626] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1153.501474] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1153.520446] kobject: '0:46' (000000005ee94b53): kobject_add_internal: parent: 'bdi', set: 'devices' 10:32:58 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) [ 1153.536262] FAULT_INJECTION: forcing a failure. [ 1153.536262] name failslab, interval 1, probability 0, space 0, times 0 [ 1153.543908] kobject: '0:49' (00000000b232d9b4): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1153.557496] kobject: '0:46' (000000005ee94b53): kobject_uevent_env [ 1153.567600] kobject: '0:47' (0000000098d9ac20): kobject_uevent_env 10:32:58 executing program 1: futex(&(0x7f000000cffc)=0x100000, 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1153.593686] kobject: 'loop0' (00000000e97107a8): kobject_uevent_env [ 1153.609759] kobject: '0:47' (0000000098d9ac20): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1153.620437] kobject: '0:49' (00000000b232d9b4): kobject_uevent_env [ 1153.623828] CPU: 1 PID: 18864 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1153.633981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1153.638714] kobject: '0:49' (00000000b232d9b4): fill_kobj_path: path = '/devices/virtual/bdi/0:49' [ 1153.643346] Call Trace: [ 1153.643369] dump_stack+0x172/0x1f0 [ 1153.643386] should_fail.cold+0xa/0x1b [ 1153.643401] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1153.643416] ? lock_downgrade+0x810/0x810 [ 1153.643430] ? set_page_refcounted+0x100/0x100 [ 1153.643445] ? ___might_sleep+0x163/0x280 [ 1153.643460] __should_failslab+0x121/0x190 [ 1153.643476] should_failslab+0x9/0x14 [ 1153.643491] kmem_cache_alloc+0x2b2/0x6f0 [ 1153.643504] ? notify_change+0x6d5/0xfb0 [ 1153.643522] getname_flags+0xd6/0x5b0 [ 1153.653112] kobject: '0:46' (000000005ee94b53): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 1153.655194] getname+0x1a/0x20 [ 1153.655207] do_sys_open+0x2c9/0x5d0 [ 1153.655223] ? filp_open+0x80/0x80 [ 1153.720646] ? fput+0x128/0x1a0 [ 1153.722119] kobject: 'loop0' (00000000e97107a8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1153.723942] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1153.723959] __x64_sys_open+0x7e/0xc0 10:32:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 1153.723975] do_syscall_64+0x103/0x610 [ 1153.723991] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1153.747255] kobject: 'loop1' (00000000463a1cc1): kobject_uevent_env [ 1153.751620] RIP: 0033:0x411f11 [ 1153.751636] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1153.751645] RSP: 002b:00007fcf11fefa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1153.751658] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1153.751667] RDX: 00007fcf11fefafa RSI: 0000000000000002 RDI: 00007fcf11fefaf0 [ 1153.751682] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1153.751689] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1153.751697] R13: 0000000000000000 R14: 00000000004dbd08 R15: 0000000000000003 [ 1153.758280] kobject: '0:47' (0000000098d9ac20): kobject_cleanup, parent (null) [ 1153.784627] kobject: 'loop1' (00000000463a1cc1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1153.788648] kobject: '0:47' (0000000098d9ac20): calling ktype release [ 1153.851804] kobject: '0:46' (000000005ee94b53): kobject_uevent_env [ 1153.853413] kobject: '0:47': free name [ 1153.858160] kobject: '0:46' (000000005ee94b53): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 1153.858320] kobject: '0:46' (000000005ee94b53): kobject_cleanup, parent (null) [ 1153.892058] kobject: 'loop1' (00000000463a1cc1): kobject_uevent_env [ 1153.898524] kobject: 'loop1' (00000000463a1cc1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1153.930000] kobject: 'loop3' (0000000015a5ca95): kobject_uevent_env [ 1153.940494] kobject: 'loop3' (0000000015a5ca95): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1153.971829] kobject: '0:46' (000000005ee94b53): calling ktype release [ 1154.006032] kobject: 'loop0' (00000000e97107a8): kobject_uevent_env [ 1154.027691] kobject: '0:46': free name [ 1154.032950] kobject: '0:47' (000000002981dea6): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1154.048299] kobject: 'loop0' (00000000e97107a8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1154.066755] kobject: '0:47' (000000002981dea6): kobject_uevent_env [ 1154.082769] kobject: '0:47' (000000002981dea6): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1154.083094] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1154.108906] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1154.122678] kobject: 'loop1' (00000000463a1cc1): kobject_uevent_env [ 1154.139072] kobject: 'loop1' (00000000463a1cc1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1154.155818] kobject: 'loop2' (000000007c80e940): kobject_uevent_env [ 1154.163080] kobject: 'loop2' (000000007c80e940): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1154.207536] kobject: '0:47' (000000002981dea6): kobject_uevent_env [ 1154.215709] kobject: 'batman_adv' (0000000050c9dc73): kobject_uevent_env [ 1154.222937] kobject: '0:47' (000000002981dea6): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1154.232528] kobject: 'batman_adv' (0000000050c9dc73): kobject_uevent_env: filter function caused the event to drop! [ 1154.235516] kobject: '0:47' (000000002981dea6): kobject_cleanup, parent (null) [ 1154.243562] kobject: 'batman_adv' (0000000050c9dc73): kobject_cleanup, parent (null) [ 1154.260507] kobject: 'batman_adv' (0000000050c9dc73): calling ktype release [ 1154.266092] kobject: '0:47' (000000002981dea6): calling ktype release [ 1154.268118] kobject: (0000000050c9dc73): dynamic_kobj_release [ 1154.275832] kobject: '0:47': free name [ 1154.280991] kobject: 'batman_adv': free name [ 1154.287955] kobject: '0:55' (00000000140ca7e2): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1154.298815] kobject: '0:55' (00000000140ca7e2): kobject_uevent_env [ 1154.307027] kobject: '0:55' (00000000140ca7e2): fill_kobj_path: path = '/devices/virtual/bdi/0:55' [ 1154.311144] kobject: 'loop3' (0000000015a5ca95): kobject_uevent_env [ 1154.316561] kobject: 'rx-0' (00000000777b36c0): kobject_cleanup, parent 00000000880f16cc [ 1154.322896] kobject: 'loop3' (0000000015a5ca95): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1154.342379] kobject: 'rx-0' (00000000777b36c0): auto cleanup 'remove' event [ 1154.348203] kobject: '0:55' (00000000140ca7e2): kobject_uevent_env [ 1154.355363] kobject: 'rx-0' (00000000777b36c0): kobject_uevent_env [ 1154.356000] kobject: '0:55' (00000000140ca7e2): fill_kobj_path: path = '/devices/virtual/bdi/0:55' [ 1154.363977] kobject: 'rx-0' (00000000777b36c0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1154.375939] kobject: '0:55' (00000000140ca7e2): kobject_cleanup, parent (null) [ 1154.382523] kobject: 'rx-0' (00000000777b36c0): auto cleanup kobject_del [ 1154.390131] kobject: '0:55' (00000000140ca7e2): calling ktype release 10:32:58 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x2000000) 10:32:58 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:58 executing program 1: futex(&(0x7f000000cffc)=0x307100, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:32:58 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x2) 10:32:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 1154.398120] kobject: 'rx-0' (00000000777b36c0): calling ktype release [ 1154.406960] kobject: '0:55': free name [ 1154.411014] kobject: 'rx-0': free name [ 1154.418788] kobject: 'tx-0' (000000005fdfefa4): kobject_cleanup, parent 00000000880f16cc [ 1154.427442] kobject: 'tx-0' (000000005fdfefa4): auto cleanup 'remove' event [ 1154.435092] kobject: 'tx-0' (000000005fdfefa4): kobject_uevent_env [ 1154.451694] kobject: 'tx-0' (000000005fdfefa4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1154.462667] kobject: '0:49' (00000000b232d9b4): kobject_uevent_env [ 1154.464674] kobject: 'tx-0' (000000005fdfefa4): auto cleanup kobject_del [ 1154.473366] kobject: '0:49' (00000000b232d9b4): fill_kobj_path: path = '/devices/virtual/bdi/0:49' [ 1154.487061] FAULT_INJECTION: forcing a failure. [ 1154.487061] name failslab, interval 1, probability 0, space 0, times 0 [ 1154.493932] kobject: '0:49' (00000000b232d9b4): kobject_cleanup, parent (null) [ 1154.517278] kobject: 'tx-0' (000000005fdfefa4): calling ktype release [ 1154.544265] kobject: 'tx-0': free name [ 1154.549396] CPU: 0 PID: 18896 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1154.556623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1154.565977] Call Trace: [ 1154.566869] kobject: '0:46' (00000000b7e495ef): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1154.568572] dump_stack+0x172/0x1f0 [ 1154.568594] should_fail.cold+0xa/0x1b [ 1154.568611] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1154.568628] ? lock_downgrade+0x810/0x810 [ 1154.568645] ? set_page_refcounted+0x100/0x100 [ 1154.568664] ? ___might_sleep+0x163/0x280 [ 1154.568684] __should_failslab+0x121/0x190 [ 1154.568703] should_failslab+0x9/0x14 [ 1154.568721] kmem_cache_alloc+0x2b2/0x6f0 10:32:59 executing program 1: futex(&(0x7f000000cffc)=0x400000, 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1154.568808] ? __save_stack_trace+0x8a/0xf0 [ 1154.568832] __alloc_file+0x27/0x300 [ 1154.568850] alloc_empty_file+0x72/0x170 [ 1154.568867] path_openat+0xef/0x4690 [ 1154.568885] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1154.568900] ? kasan_slab_alloc+0xf/0x20 [ 1154.568913] ? kmem_cache_alloc+0x11a/0x6f0 [ 1154.568929] ? getname_flags+0xd6/0x5b0 [ 1154.568949] ? getname+0x1a/0x20 [ 1154.568964] ? do_sys_open+0x2c9/0x5d0 [ 1154.568977] ? __x64_sys_open+0x7e/0xc0 [ 1154.568993] ? do_syscall_64+0x103/0x610 10:32:59 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:32:59 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 1154.569009] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1154.569032] ? lock_downgrade+0x810/0x810 [ 1154.578428] kobject: '0:49' (00000000b232d9b4): calling ktype release [ 1154.581842] ? mark_held_locks+0x100/0x100 [ 1154.581859] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1154.581870] ? mark_held_locks+0x100/0x100 [ 1154.581884] ? __alloc_pages_nodemask+0x4bb/0x710 [ 1154.581901] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1154.581917] do_filp_open+0x1a1/0x280 [ 1154.581933] ? may_open_dev+0x100/0x100 [ 1154.581948] ? do_dup2+0x410/0x410 [ 1154.594659] kobject: '0:49': free name [ 1154.595067] ? lock_downgrade+0x810/0x810 [ 1154.615053] kobject: '0:46' (00000000b7e495ef): kobject_uevent_env [ 1154.616456] ? __alloc_fd+0x35/0x530 [ 1154.616475] ? kasan_check_read+0x11/0x20 [ 1154.616490] ? do_raw_spin_unlock+0x57/0x270 [ 1154.616505] ? _raw_spin_unlock+0x2d/0x50 [ 1154.616518] ? __alloc_fd+0x430/0x530 [ 1154.616539] do_sys_open+0x3fe/0x5d0 [ 1154.616554] ? filp_open+0x80/0x80 [ 1154.616570] ? fput+0x128/0x1a0 [ 1154.616585] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1154.616601] __x64_sys_open+0x7e/0xc0 [ 1154.616618] do_syscall_64+0x103/0x610 [ 1154.616635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1154.616647] RIP: 0033:0x411f11 [ 1154.616661] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1154.616669] RSP: 002b:00007fcf11fefa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 10:32:59 executing program 4 (fault-call:0 fault-nth:8): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1154.616683] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1154.616692] RDX: 00007fcf11fefafa RSI: 0000000000000002 RDI: 00007fcf11fefaf0 [ 1154.616700] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1154.616709] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1154.616717] R13: 0000000000000000 R14: 00000000004dbd08 R15: 0000000000000003 [ 1154.624151] kobject: 'queues' (00000000880f16cc): kobject_cleanup, parent (null) [ 1154.633224] kobject: '0:46' (00000000b7e495ef): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 1154.648382] kobject: 'queues' (00000000880f16cc): calling ktype release [ 1154.671282] kobject: 'loop5' (000000003cbebe53): kobject_uevent_env [ 1154.680499] kobject: 'queues' (00000000880f16cc): kset_release [ 1154.708224] kobject: 'loop5' (000000003cbebe53): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1154.716309] kobject: 'queues': free name [ 1154.739493] kobject: '0:47' (00000000f54cee02): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1154.744951] kobject: 'hsr0' (00000000e44116eb): kobject_uevent_env [ 1154.767036] kobject: '0:47' (00000000f54cee02): kobject_uevent_env [ 1154.788639] kobject: 'hsr0' (00000000e44116eb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1154.831081] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1154.846854] kobject: 'batman_adv' (00000000745483e7): kobject_uevent_env [ 1154.855422] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1154.859819] kobject: 'batman_adv' (00000000745483e7): kobject_uevent_env: filter function caused the event to drop! [ 1154.881372] kobject: 'loop1' (00000000463a1cc1): kobject_uevent_env [ 1154.892404] FAULT_INJECTION: forcing a failure. [ 1154.892404] name failslab, interval 1, probability 0, space 0, times 0 [ 1154.909511] kobject: 'loop1' (00000000463a1cc1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1154.924599] kobject: 'batman_adv' (00000000745483e7): kobject_cleanup, parent (null) [ 1154.941419] kobject: '0:47' (00000000f54cee02): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1154.948100] kobject: 'batman_adv' (00000000745483e7): calling ktype release [ 1154.976312] kobject: 'loop3' (0000000015a5ca95): kobject_uevent_env [ 1154.988769] CPU: 0 PID: 18908 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1154.997169] kobject: 'loop3' (0000000015a5ca95): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1155.001690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1155.001695] Call Trace: [ 1155.001718] dump_stack+0x172/0x1f0 [ 1155.001735] should_fail.cold+0xa/0x1b [ 1155.001751] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1155.001766] ? lock_downgrade+0x810/0x810 10:32:59 executing program 1: futex(&(0x7f000000cffc)=0x50a000, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:59 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x3) [ 1155.001779] ? set_page_refcounted+0x100/0x100 [ 1155.001794] ? ___might_sleep+0x163/0x280 [ 1155.001810] __should_failslab+0x121/0x190 [ 1155.014437] kobject: (00000000745483e7): dynamic_kobj_release [ 1155.018085] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1155.018104] should_failslab+0x9/0x14 [ 1155.024826] kobject: 'batman_adv': free name [ 1155.031710] kmem_cache_alloc_trace+0x2d1/0x760 [ 1155.031726] ? lockdep_init_map+0x10c/0x5b0 [ 1155.031742] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1155.031757] __kthread_create_on_node+0xf2/0x460 [ 1155.031769] ? lock_acquire+0x16f/0x3f0 [ 1155.031783] ? kthread_parkme+0xb0/0xb0 [ 1155.031815] ? __fget+0x9d/0x540 [ 1155.131604] ? mutex_trylock+0x1e0/0x1e0 [ 1155.135652] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1155.140401] kthread_create_on_node+0xbb/0xf0 [ 1155.144880] ? __kthread_create_on_node+0x460/0x460 [ 1155.149883] ? lockdep_init_map+0x10c/0x5b0 [ 1155.154190] ? lockdep_init_map+0x10c/0x5b0 [ 1155.158532] lo_ioctl+0xafb/0x20d0 [ 1155.162079] ? lo_rw_aio+0x1530/0x1530 [ 1155.166003] blkdev_ioctl+0xee8/0x1c40 [ 1155.169906] ? blkpg_ioctl+0xa90/0xa90 [ 1155.170876] kobject: '0:55' (000000009297919d): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1155.173799] ? mark_held_locks+0x100/0x100 [ 1155.173814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1155.173833] ? timespec64_trunc+0xf0/0x180 [ 1155.183283] kobject: '0:55' (000000009297919d): kobject_uevent_env [ 1155.187243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1155.187257] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1155.187273] ? kasan_check_read+0x11/0x20 [ 1155.187290] ? do_raw_spin_lock+0x12a/0x2e0 [ 1155.193347] kobject: '0:55' (000000009297919d): fill_kobj_path: path = '/devices/virtual/bdi/0:55' [ 1155.197041] ? lock_downgrade+0x810/0x810 [ 1155.197057] ? debug_check_no_obj_freed+0xbe/0x464 [ 1155.197119] block_ioctl+0xee/0x130 [ 1155.244014] ? blkdev_fallocate+0x410/0x410 [ 1155.248335] do_vfs_ioctl+0xd6e/0x1390 [ 1155.252229] ? ioctl_preallocate+0x210/0x210 [ 1155.256664] ? __fget+0x367/0x540 [ 1155.260115] ? iterate_fd+0x360/0x360 [ 1155.263901] ? do_sys_open+0x31d/0x5d0 [ 1155.267794] ? security_file_ioctl+0x93/0xc0 [ 1155.272192] ksys_ioctl+0xab/0xd0 [ 1155.275633] __x64_sys_ioctl+0x73/0xb0 [ 1155.279513] do_syscall_64+0x103/0x610 [ 1155.283416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1155.288595] RIP: 0033:0x457c97 [ 1155.291769] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1155.310678] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1155.318382] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1155.325658] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1155.332912] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1155.340165] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1155.347420] R13: 0000000000000000 R14: 00000000004dbd08 R15: 0000000000000003 [ 1155.360072] device hsr_slave_1 left promiscuous mode [ 1155.364131] kobject: 'loop0' (00000000e97107a8): kobject_uevent_env [ 1155.374277] kobject: '0:47' (00000000f54cee02): kobject_uevent_env [ 1155.377419] kobject: 'loop0' (00000000e97107a8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1155.390264] kobject: '0:47' (00000000f54cee02): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1155.405029] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1155.412540] kobject: '0:47' (00000000f54cee02): kobject_cleanup, parent (null) [ 1155.416627] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1155.422273] kobject: 'rx-0' (000000000e9e95da): kobject_cleanup, parent 0000000006ed8bfb [ 1155.444851] kobject: 'loop3' (0000000015a5ca95): kobject_uevent_env [ 1155.452321] kobject: '0:47' (00000000f54cee02): calling ktype release [ 1155.459531] kobject: 'rx-0' (000000000e9e95da): auto cleanup 'remove' event [ 1155.466259] kobject: 'loop3' (0000000015a5ca95): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1155.467470] kobject: '0:47': free name [ 1155.483930] kobject: 'rx-0' (000000000e9e95da): kobject_uevent_env [ 1155.517079] kobject: '0:46' (00000000b7e495ef): kobject_uevent_env [ 1155.518137] kobject: 'rx-0' (000000000e9e95da): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1155.534545] kobject: 'loop1' (00000000463a1cc1): kobject_uevent_env [ 1155.538280] kobject: '0:46' (00000000b7e495ef): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 1155.541425] kobject: 'loop1' (00000000463a1cc1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1155.554226] kobject: '0:46' (00000000b7e495ef): kobject_cleanup, parent (null) [ 1155.560275] kobject: 'rx-0' (000000000e9e95da): auto cleanup kobject_del [ 1155.571953] kobject: '0:46' (00000000b7e495ef): calling ktype release [ 1155.577436] kobject: 'rx-0' (000000000e9e95da): calling ktype release [ 1155.588662] kobject: '0:46': free name [ 1155.589529] kobject: 'rx-0': free name [ 1155.597022] kobject: 'tx-0' (00000000617eb99b): kobject_cleanup, parent 0000000006ed8bfb [ 1155.605418] kobject: 'tx-0' (00000000617eb99b): auto cleanup 'remove' event [ 1155.613052] kobject: 'tx-0' (00000000617eb99b): kobject_uevent_env [ 1155.617750] kobject: 'loop0' (00000000e97107a8): kobject_uevent_env [ 1155.619374] kobject: 'tx-0' (00000000617eb99b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1155.619381] kobject: 'tx-0' (00000000617eb99b): auto cleanup kobject_del [ 1155.619417] kobject: 'tx-0' (00000000617eb99b): calling ktype release [ 1155.619422] kobject: 'tx-0': free name [ 1155.619441] kobject: 'queues' (0000000006ed8bfb): kobject_cleanup, parent (null) [ 1155.619448] kobject: 'queues' (0000000006ed8bfb): calling ktype release [ 1155.619455] kobject: 'queues' (0000000006ed8bfb): kset_release [ 1155.619463] kobject: 'queues': free name [ 1155.619766] kobject: 'hsr_slave_1' (00000000fd0f75e9): kobject_uevent_env [ 1155.627863] kobject: 'loop0' (00000000e97107a8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1155.636028] kobject: 'hsr_slave_1' (00000000fd0f75e9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1155.661105] kobject: 'loop2' (000000007c80e940): kobject_uevent_env [ 1155.662916] kobject: 'batman_adv' (00000000d0971898): kobject_uevent_env [ 1155.668770] kobject: 'loop2' (000000007c80e940): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1155.674757] kobject: 'batman_adv' (00000000d0971898): kobject_uevent_env: filter function caused the event to drop! [ 1155.674787] kobject: 'batman_adv' (00000000d0971898): kobject_cleanup, parent (null) [ 1155.674797] kobject: 'batman_adv' (00000000d0971898): calling ktype release [ 1155.750236] kobject: '0:49' (00000000fcf3ad19): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1155.755632] kobject: (00000000d0971898): dynamic_kobj_release [ 1155.768168] kobject: '0:49' (00000000fcf3ad19): kobject_uevent_env [ 1155.777575] kobject: '0:49' (00000000fcf3ad19): fill_kobj_path: path = '/devices/virtual/bdi/0:49' [ 1155.780873] kobject: 'batman_adv': free name [ 1155.791926] kobject: '0:57' (000000004a673e59): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1155.795088] kobject: 'rx-0' (000000006b344147): kobject_cleanup, parent 00000000c7860a69 [ 1155.803213] kobject: '0:57' (000000004a673e59): kobject_uevent_env [ 1155.813992] kobject: '0:49' (00000000fcf3ad19): kobject_uevent_env [ 1155.816123] kobject: '0:57' (000000004a673e59): fill_kobj_path: path = '/devices/virtual/bdi/0:57' [ 1155.825383] kobject: 'rx-0' (000000006b344147): auto cleanup 'remove' event [ 1155.838316] kobject: '0:49' (00000000fcf3ad19): fill_kobj_path: path = '/devices/virtual/bdi/0:49' [ 1155.839083] kobject: 'rx-0' (000000006b344147): kobject_uevent_env [ 1155.857541] kobject: 'rx-0' (000000006b344147): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1155.868287] kobject: 'rx-0' (000000006b344147): auto cleanup kobject_del [ 1155.871872] kobject: '0:49' (00000000fcf3ad19): kobject_cleanup, parent (null) [ 1155.878457] kobject: 'rx-0' (000000006b344147): calling ktype release [ 1155.884187] kobject: '0:47' (0000000088eb647d): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1155.890239] kobject: 'rx-0': free name [ 1155.899484] kobject: '0:47' (0000000088eb647d): kobject_uevent_env [ 1155.906827] kobject: 'tx-0' (00000000a8ec1df9): kobject_cleanup, parent 00000000c7860a69 [ 1155.909638] kobject: '0:49' (00000000fcf3ad19): calling ktype release [ 1155.909657] kobject: '0:49': free name [ 1155.918234] kobject: 'tx-0' (00000000a8ec1df9): auto cleanup 'remove' event [ 1155.925151] kobject: '0:47' (0000000088eb647d): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1155.931779] kobject: 'tx-0' (00000000a8ec1df9): kobject_uevent_env [ 1155.953053] kobject: '0:47' (0000000088eb647d): kobject_uevent_env 10:33:00 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x8cffffff) 10:33:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:33:00 executing program 4 (fault-call:0 fault-nth:9): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:33:00 executing program 1: futex(&(0x7f000000cffc)=0x70a000, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:33:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:33:00 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x4) [ 1155.955507] kobject: 'tx-0' (00000000a8ec1df9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1155.959414] kobject: '0:47' (0000000088eb647d): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1155.969398] kobject: '0:47' (0000000088eb647d): kobject_cleanup, parent (null) [ 1155.970157] kobject: 'tx-0' (00000000a8ec1df9): auto cleanup kobject_del [ 1156.000403] kobject: '0:47' (0000000088eb647d): calling ktype release [ 1156.000872] kobject: 'tx-0' (00000000a8ec1df9): calling ktype release [ 1156.008467] kobject: '0:47': free name [ 1156.018189] kobject: '0:55' (000000009297919d): kobject_uevent_env [ 1156.019590] kobject: 'tx-0': free name [ 1156.026101] kobject: '0:55' (000000009297919d): fill_kobj_path: path = '/devices/virtual/bdi/0:55' [ 1156.031715] kobject: 'queues' (00000000c7860a69): kobject_cleanup, parent (null) [ 1156.038318] FAULT_INJECTION: forcing a failure. [ 1156.038318] name failslab, interval 1, probability 0, space 0, times 0 [ 1156.053838] kobject: '0:55' (000000009297919d): kobject_cleanup, parent (null) [ 1156.065961] kobject: '0:57' (000000004a673e59): kobject_uevent_env [ 1156.096879] kobject: '0:55' (000000009297919d): calling ktype release [ 1156.101720] kobject: '0:57' (000000004a673e59): fill_kobj_path: path = '/devices/virtual/bdi/0:57' [ 1156.113658] CPU: 0 PID: 18936 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1156.120799] kobject: 'queues' (00000000c7860a69): calling ktype release [ 1156.120847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1156.120852] Call Trace: [ 1156.120871] dump_stack+0x172/0x1f0 [ 1156.120888] should_fail.cold+0xa/0x1b [ 1156.120905] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1156.127841] kobject: 'queues' (00000000c7860a69): kset_release [ 1156.137047] ? lock_downgrade+0x810/0x810 [ 1156.137061] ? set_page_refcounted+0x100/0x100 [ 1156.137076] ? ___might_sleep+0x163/0x280 [ 1156.137090] __should_failslab+0x121/0x190 [ 1156.137105] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1156.137119] should_failslab+0x9/0x14 [ 1156.137133] kmem_cache_alloc_trace+0x2d1/0x760 [ 1156.137149] ? lockdep_init_map+0x10c/0x5b0 [ 1156.156328] kobject: 'queues': free name [ 1156.158263] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1156.158279] __kthread_create_on_node+0xf2/0x460 [ 1156.158291] ? lock_acquire+0x16f/0x3f0 [ 1156.158306] ? kthread_parkme+0xb0/0xb0 [ 1156.158330] ? __fget+0x9d/0x540 [ 1156.167126] kobject: '0:57' (000000004a673e59): kobject_cleanup, parent (null) [ 1156.171212] ? mutex_trylock+0x1e0/0x1e0 [ 1156.171227] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1156.171241] kthread_create_on_node+0xbb/0xf0 [ 1156.171267] ? __kthread_create_on_node+0x460/0x460 [ 1156.171283] ? lockdep_init_map+0x10c/0x5b0 [ 1156.171296] ? lockdep_init_map+0x10c/0x5b0 [ 1156.171313] lo_ioctl+0xafb/0x20d0 [ 1156.171330] ? lo_rw_aio+0x1530/0x1530 [ 1156.175988] kobject: 'veth1_to_hsr' (00000000bb7a5d31): kobject_uevent_env [ 1156.180309] blkdev_ioctl+0xee8/0x1c40 [ 1156.180323] ? blkpg_ioctl+0xa90/0xa90 [ 1156.180336] ? mark_held_locks+0x100/0x100 [ 1156.180351] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1156.180368] ? kasan_check_read+0x11/0x20 [ 1156.187609] kobject: '0:57' (000000004a673e59): calling ktype release 10:33:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:33:00 executing program 1: futex(&(0x7f000000cffc)=0x713000, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:33:00 executing program 4 (fault-call:0 fault-nth:10): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:33:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) [ 1156.188827] ? do_raw_spin_lock+0x12a/0x2e0 [ 1156.199261] kobject: '0:57': free name [ 1156.201940] ? lock_downgrade+0x810/0x810 [ 1156.201960] ? debug_check_no_obj_freed+0xbe/0x464 [ 1156.201976] block_ioctl+0xee/0x130 [ 1156.207399] kobject: 'veth1_to_hsr' (00000000bb7a5d31): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1156.210710] ? blkdev_fallocate+0x410/0x410 [ 1156.210729] do_vfs_ioctl+0xd6e/0x1390 [ 1156.210744] ? ioctl_preallocate+0x210/0x210 [ 1156.210757] ? __fget+0x367/0x540 [ 1156.210772] ? iterate_fd+0x360/0x360 [ 1156.210788] ? do_sys_open+0x31d/0x5d0 [ 1156.215436] kobject: 'batman_adv' (000000004ea596a0): kobject_uevent_env [ 1156.218115] ? security_file_ioctl+0x93/0xc0 [ 1156.226717] kobject: 'batman_adv' (000000004ea596a0): kobject_uevent_env: filter function caused the event to drop! [ 1156.230377] ksys_ioctl+0xab/0xd0 [ 1156.235458] kobject: 'batman_adv' (000000004ea596a0): kobject_cleanup, parent (null) [ 1156.239607] __x64_sys_ioctl+0x73/0xb0 [ 1156.239624] do_syscall_64+0x103/0x610 [ 1156.239640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1156.239651] RIP: 0033:0x457c97 [ 1156.239666] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1156.244959] kobject: 'batman_adv' (000000004ea596a0): calling ktype release [ 1156.248985] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1156.253598] kobject: (000000004ea596a0): dynamic_kobj_release [ 1156.256823] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1156.256831] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1156.256838] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1156.256846] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1156.256854] R13: 0000000000000000 R14: 00000000004dbd08 R15: 0000000000000003 [ 1156.294430] kobject: '0:55': free name [ 1156.296767] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1156.302040] kobject: 'batman_adv': free name [ 1156.304984] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1156.501996] device hsr_slave_0 left promiscuous mode [ 1156.508191] kobject: 'loop2' (000000007c80e940): kobject_uevent_env [ 1156.518061] kobject: 'loop2' (000000007c80e940): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1156.530139] kobject: 'rx-0' (000000007227f5d3): kobject_cleanup, parent 00000000767f0824 [ 1156.539559] kobject: 'rx-0' (000000007227f5d3): auto cleanup 'remove' event [ 1156.559393] FAULT_INJECTION: forcing a failure. [ 1156.559393] name failslab, interval 1, probability 0, space 0, times 0 [ 1156.581386] kobject: 'loop5' (000000003cbebe53): kobject_uevent_env 10:33:01 executing program 1: futex(&(0x7f000000cffc)=0x740000, 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1156.605007] kobject: 'rx-0' (000000007227f5d3): kobject_uevent_env [ 1156.618500] kobject: 'loop5' (000000003cbebe53): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1156.628702] kobject: 'rx-0' (000000007227f5d3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1156.631910] kobject: '0:46' (0000000034e4b10c): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1156.643815] kobject: 'loop0' (00000000e97107a8): kobject_uevent_env [ 1156.655251] CPU: 0 PID: 18947 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1156.655264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1156.666789] kobject: 'rx-0' (000000007227f5d3): auto cleanup kobject_del [ 1156.671792] Call Trace: [ 1156.671827] dump_stack+0x172/0x1f0 [ 1156.671845] should_fail.cold+0xa/0x1b [ 1156.671861] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1156.671875] ? lock_downgrade+0x810/0x810 [ 1156.671889] ? set_page_refcounted+0x100/0x100 [ 1156.671906] ? ___might_sleep+0x163/0x280 10:33:01 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) [ 1156.679400] kobject: 'rx-0' (000000007227f5d3): calling ktype release [ 1156.681318] __should_failslab+0x121/0x190 [ 1156.681347] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1156.681374] should_failslab+0x9/0x14 [ 1156.681399] kmem_cache_alloc_trace+0x2d1/0x760 [ 1156.681413] ? lockdep_init_map+0x10c/0x5b0 [ 1156.681429] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1156.681444] __kthread_create_on_node+0xf2/0x460 [ 1156.681456] ? lock_acquire+0x16f/0x3f0 [ 1156.681471] ? kthread_parkme+0xb0/0xb0 [ 1156.681489] ? __fget+0x9d/0x540 [ 1156.685527] kobject: 'rx-0': free name [ 1156.688989] ? mutex_trylock+0x1e0/0x1e0 [ 1156.689005] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1156.689020] kthread_create_on_node+0xbb/0xf0 [ 1156.689034] ? __kthread_create_on_node+0x460/0x460 [ 1156.689050] ? lockdep_init_map+0x10c/0x5b0 [ 1156.689064] ? lockdep_init_map+0x10c/0x5b0 [ 1156.689081] lo_ioctl+0xafb/0x20d0 [ 1156.689098] ? lo_rw_aio+0x1530/0x1530 [ 1156.701300] kobject: 'loop0' (00000000e97107a8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1156.702896] blkdev_ioctl+0xee8/0x1c40 [ 1156.702911] ? blkpg_ioctl+0xa90/0xa90 [ 1156.702924] ? mark_held_locks+0x100/0x100 [ 1156.702940] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1156.707745] kobject: 'loop1' (00000000463a1cc1): kobject_uevent_env [ 1156.713649] ? kasan_check_read+0x11/0x20 [ 1156.713665] ? do_raw_spin_lock+0x12a/0x2e0 [ 1156.713691] ? lock_downgrade+0x810/0x810 [ 1156.713717] ? debug_check_no_obj_freed+0xbe/0x464 [ 1156.713750] block_ioctl+0xee/0x130 [ 1156.713762] ? blkdev_fallocate+0x410/0x410 [ 1156.713776] do_vfs_ioctl+0xd6e/0x1390 [ 1156.713791] ? ioctl_preallocate+0x210/0x210 [ 1156.713803] ? __fget+0x367/0x540 [ 1156.713825] ? iterate_fd+0x360/0x360 [ 1156.718450] kobject: 'tx-0' (0000000018d6213d): kobject_cleanup, parent 00000000767f0824 [ 1156.722985] ? do_sys_open+0x31d/0x5d0 [ 1156.723006] ? security_file_ioctl+0x93/0xc0 [ 1156.723021] ksys_ioctl+0xab/0xd0 [ 1156.723036] __x64_sys_ioctl+0x73/0xb0 [ 1156.723054] do_syscall_64+0x103/0x610 [ 1156.727163] kobject: 'loop1' (00000000463a1cc1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1156.731503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1156.731514] RIP: 0033:0x457c97 [ 1156.731529] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1156.731536] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1156.731549] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1156.731557] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1156.731564] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1156.731572] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1156.731580] R13: 0000000000000000 R14: 00000000004dbd08 R15: 0000000000000003 [ 1156.733867] kobject: '0:47' (000000006b8323a4): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1156.736363] kobject: 'tx-0' (0000000018d6213d): auto cleanup 'remove' event [ 1156.754982] kobject: '0:47' (000000006b8323a4): kobject_uevent_env [ 1156.765372] kobject: 'loop3' (0000000015a5ca95): kobject_uevent_env [ 1156.773042] kobject: '0:46' (0000000034e4b10c): kobject_uevent_env [ 1156.781584] kobject: 'loop3' (0000000015a5ca95): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1156.786548] kobject: '0:47' (000000006b8323a4): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1156.806777] kobject: 'tx-0' (0000000018d6213d): kobject_uevent_env [ 1156.810726] kobject: '0:46' (0000000034e4b10c): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 1156.830154] kobject: 'tx-0' (0000000018d6213d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1156.878580] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1157.000008] kobject: '0:55' (00000000367d4205): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1157.016535] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1157.051430] kobject: 'tx-0' (0000000018d6213d): auto cleanup kobject_del [ 1157.062482] kobject: '0:55' (00000000367d4205): kobject_uevent_env [ 1157.071351] kobject: 'tx-0' (0000000018d6213d): calling ktype release [ 1157.076798] kobject: '0:55' (00000000367d4205): fill_kobj_path: path = '/devices/virtual/bdi/0:55' [ 1157.091163] kobject: 'tx-0': free name [ 1157.117946] kobject: 'loop1' (00000000463a1cc1): kobject_uevent_env [ 1157.123114] kobject: 'queues' (00000000767f0824): kobject_cleanup, parent (null) [ 1157.133084] kobject: 'loop1' (00000000463a1cc1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1157.139437] kobject: 'queues' (00000000767f0824): calling ktype release [ 1157.149222] kobject: 'loop3' (0000000015a5ca95): kobject_uevent_env [ 1157.150248] kobject: 'queues' (00000000767f0824): kset_release [ 1157.156931] kobject: 'loop3' (0000000015a5ca95): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1157.165792] kobject: 'queues': free name [ 1157.172410] kobject: '0:55' (00000000367d4205): kobject_uevent_env [ 1157.176778] kobject: 'hsr_slave_0' (00000000a4a2c3a5): kobject_uevent_env [ 1157.182820] kobject: '0:55' (00000000367d4205): fill_kobj_path: path = '/devices/virtual/bdi/0:55' [ 1157.193091] kobject: 'hsr_slave_0' (00000000a4a2c3a5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1157.214584] kobject: 'batman_adv' (00000000b5f1f85b): kobject_uevent_env [ 1157.223390] kobject: 'batman_adv' (00000000b5f1f85b): kobject_uevent_env: filter function caused the event to drop! [ 1157.236169] kobject: 'batman_adv' (00000000b5f1f85b): kobject_cleanup, parent (null) [ 1157.244414] kobject: '0:55' (00000000367d4205): kobject_cleanup, parent (null) [ 1157.247095] kobject: 'batman_adv' (00000000b5f1f85b): calling ktype release [ 1157.253735] kobject: '0:55' (00000000367d4205): calling ktype release [ 1157.263207] kobject: (00000000b5f1f85b): dynamic_kobj_release [ 1157.268205] kobject: '0:55': free name [ 1157.275398] kobject: 'batman_adv': free name [ 1157.282339] kobject: 'rx-0' (00000000963dffd1): kobject_cleanup, parent 000000001013bec8 [ 1157.290659] kobject: 'rx-0' (00000000963dffd1): auto cleanup 'remove' event [ 1157.291052] kobject: '0:47' (000000006b8323a4): kobject_uevent_env [ 1157.297957] kobject: 'rx-0' (00000000963dffd1): kobject_uevent_env [ 1157.307249] kobject: '0:47' (000000006b8323a4): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1157.310702] kobject: 'rx-0' (00000000963dffd1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1157.321299] kobject: '0:47' (000000006b8323a4): kobject_cleanup, parent (null) [ 1157.332879] kobject: 'rx-0' (00000000963dffd1): auto cleanup kobject_del [ 1157.338210] kobject: '0:47' (000000006b8323a4): calling ktype release [ 1157.348067] kobject: 'rx-0' (00000000963dffd1): calling ktype release [ 1157.351888] kobject: '0:47': free name [ 1157.358269] kobject: 'rx-0': free name [ 1157.366125] kobject: 'tx-0' (00000000b0a17ae9): kobject_cleanup, parent 000000001013bec8 [ 1157.374874] kobject: 'tx-0' (00000000b0a17ae9): auto cleanup 'remove' event [ 1157.382130] kobject: 'tx-0' (00000000b0a17ae9): kobject_uevent_env [ 1157.388478] kobject: 'tx-0' (00000000b0a17ae9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1157.398745] kobject: 'tx-0' (00000000b0a17ae9): auto cleanup kobject_del [ 1157.403516] kobject: '0:49' (0000000072341467): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1157.407760] kobject: 'tx-0' (00000000b0a17ae9): calling ktype release [ 1157.419063] kobject: '0:49' (0000000072341467): kobject_uevent_env [ 1157.423387] kobject: 'tx-0': free name [ 1157.428750] kobject: '0:49' (0000000072341467): fill_kobj_path: path = '/devices/virtual/bdi/0:49' [ 1157.432216] kobject: 'queues' (000000001013bec8): kobject_cleanup, parent (null) [ 1157.432223] kobject: 'queues' (000000001013bec8): calling ktype release [ 1157.432231] kobject: 'queues' (000000001013bec8): kset_release [ 1157.432239] kobject: 'queues': free name [ 1157.432569] kobject: 'veth0_to_hsr' (0000000042401c0f): kobject_uevent_env [ 1157.432577] kobject: 'veth0_to_hsr' (0000000042401c0f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1157.439571] kobject: 'loop2' (000000007c80e940): kobject_uevent_env [ 1157.491739] team0 (unregistering): Port device team_slave_1 removed [ 1157.492315] kobject: 'loop2' (000000007c80e940): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1157.498812] kobject: 'batman_adv' (000000001a204aca): kobject_uevent_env [ 1157.509588] kobject: '0:49' (0000000072341467): kobject_uevent_env [ 1157.514552] kobject: 'batman_adv' (000000001a204aca): kobject_uevent_env: filter function caused the event to drop! [ 1157.514583] kobject: 'batman_adv' (000000001a204aca): kobject_cleanup, parent (null) [ 1157.514590] kobject: 'batman_adv' (000000001a204aca): calling ktype release [ 1157.514597] kobject: (000000001a204aca): dynamic_kobj_release [ 1157.514606] kobject: 'batman_adv': free name [ 1157.514742] kobject: 'rx-0' (000000002e625be0): kobject_cleanup, parent 0000000001d12029 [ 1157.525555] kobject: '0:49' (0000000072341467): fill_kobj_path: path = '/devices/virtual/bdi/0:49' [ 1157.531980] kobject: 'rx-0' (000000002e625be0): auto cleanup 'remove' event [ 1157.550662] kobject: '0:49' (0000000072341467): kobject_cleanup, parent (null) [ 1157.561132] kobject: 'rx-0' (000000002e625be0): kobject_uevent_env [ 1157.571346] kobject: '0:49' (0000000072341467): calling ktype release [ 1157.575773] kobject: 'rx-0' (000000002e625be0): kobject_uevent_env: uevent_suppress caused the event to drop! 10:33:02 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0xf6ffffff) 10:33:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:33:02 executing program 1: futex(&(0x7f000000cffc)=0x940000, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:33:02 executing program 4 (fault-call:0 fault-nth:11): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:33:02 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x5) 10:33:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') [ 1157.584791] kobject: '0:49': free name [ 1157.591147] kobject: 'rx-0' (000000002e625be0): auto cleanup kobject_del [ 1157.629273] kobject: '0:46' (0000000034e4b10c): kobject_uevent_env [ 1157.636736] kobject: '0:46' (0000000034e4b10c): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 1157.644850] kobject: 'rx-0' (000000002e625be0): calling ktype release [ 1157.650401] kobject: '0:46' (0000000034e4b10c): kobject_cleanup, parent (null) [ 1157.656170] kobject: 'rx-0': free name 10:33:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) [ 1157.669216] kobject: 'tx-0' (000000007bac7a48): kobject_cleanup, parent 0000000001d12029 [ 1157.689309] kobject: '0:46' (0000000034e4b10c): calling ktype release [ 1157.690948] FAULT_INJECTION: forcing a failure. [ 1157.690948] name failslab, interval 1, probability 0, space 0, times 0 [ 1157.701240] kobject: '0:46': free name [ 1157.712648] kobject: 'tx-0' (000000007bac7a48): auto cleanup 'remove' event [ 1157.720402] kobject: 'tx-0' (000000007bac7a48): kobject_uevent_env [ 1157.727502] kobject: 'tx-0' (000000007bac7a48): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1157.735019] CPU: 0 PID: 18980 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1157.739508] kobject: 'tx-0' (000000007bac7a48): auto cleanup kobject_del [ 1157.745272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1157.745277] Call Trace: [ 1157.745311] dump_stack+0x172/0x1f0 [ 1157.745340] should_fail.cold+0xa/0x1b [ 1157.745355] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1157.745369] ? lock_downgrade+0x810/0x810 [ 1157.745385] ? set_page_refcounted+0x100/0x100 [ 1157.745401] ? ___might_sleep+0x163/0x280 [ 1157.745419] __should_failslab+0x121/0x190 [ 1157.752926] kobject: 'tx-0' (000000007bac7a48): calling ktype release [ 1157.761610] should_failslab+0x9/0x14 [ 1157.761625] kmem_cache_alloc+0x2b2/0x6f0 [ 1157.761706] __kernfs_new_node+0xef/0x690 [ 1157.761724] ? kernfs_dop_revalidate+0x3c0/0x3c0 10:33:02 executing program 1: futex(&(0x7f000000cffc)=0xa05000, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:33:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 1157.761737] ? lock_downgrade+0x810/0x810 [ 1157.761754] ? kasan_check_write+0x14/0x20 [ 1157.764891] kobject: 'tx-0': free name [ 1157.767954] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1157.767972] ? wait_for_completion+0x440/0x440 [ 1157.767988] kernfs_new_node+0x99/0x130 [ 1157.768004] __kernfs_create_file+0x51/0x340 [ 1157.768063] sysfs_add_file_mode_ns+0x222/0x560 [ 1157.768083] internal_create_group+0x35b/0xc40 [ 1157.772385] kobject: 'queues' (0000000001d12029): kobject_cleanup, parent (null) [ 1157.777062] ? trace_hardirqs_on+0x67/0x230 [ 1157.777081] ? remove_files.isra.0+0x190/0x190 [ 1157.777093] ? bd_set_size+0x3f/0xb0 [ 1157.777113] sysfs_create_group+0x20/0x30 [ 1157.777129] lo_ioctl+0xf8f/0x20d0 [ 1157.777145] ? lo_rw_aio+0x1530/0x1530 [ 1157.777161] blkdev_ioctl+0xee8/0x1c40 [ 1157.777186] ? blkpg_ioctl+0xa90/0xa90 [ 1157.777202] ? mark_held_locks+0x100/0x100 [ 1157.781646] kobject: 'queues' (0000000001d12029): calling ktype release [ 1157.785962] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1157.785977] ? kasan_check_read+0x11/0x20 [ 1157.785992] ? do_raw_spin_lock+0x12a/0x2e0 [ 1157.786006] ? lock_downgrade+0x810/0x810 [ 1157.786021] ? debug_check_no_obj_freed+0xbe/0x464 [ 1157.786037] block_ioctl+0xee/0x130 [ 1157.786049] ? blkdev_fallocate+0x410/0x410 [ 1157.786064] do_vfs_ioctl+0xd6e/0x1390 [ 1157.786092] ? ioctl_preallocate+0x210/0x210 [ 1157.791640] kobject: '0:46' (00000000db88202f): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1157.794544] ? __fget+0x367/0x540 [ 1157.810878] kobject: 'queues' (0000000001d12029): kset_release [ 1157.813209] ? iterate_fd+0x360/0x360 [ 1157.818212] kobject: 'queues': free name [ 1157.822105] ? do_sys_open+0x31d/0x5d0 [ 1157.822125] ? security_file_ioctl+0x93/0xc0 [ 1157.822140] ksys_ioctl+0xab/0xd0 [ 1157.822155] __x64_sys_ioctl+0x73/0xb0 [ 1157.822180] do_syscall_64+0x103/0x610 [ 1157.822199] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1157.822213] RIP: 0033:0x457c97 [ 1157.826837] kobject: '0:46' (00000000db88202f): kobject_uevent_env 10:33:02 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x6) [ 1157.830328] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1157.830337] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1157.830350] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1157.830362] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1157.836041] kobject: 'team_slave_1' (000000003f438f01): kobject_uevent_env [ 1157.839906] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1157.839914] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1157.839922] R13: 0000000000000000 R14: 00000000004dbd08 R15: 0000000000000003 [ 1157.849515] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1157.855836] kobject: '0:46' (00000000db88202f): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 1157.859312] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1157.866855] kobject: 'team_slave_1' (000000003f438f01): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1157.901089] kobject: 'loop5' (000000003cbebe53): kobject_uevent_env [ 1157.932193] kobject: '0:49' (00000000c64084c1): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1157.939661] kobject: 'loop5' (000000003cbebe53): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1157.946515] kobject: 'batman_adv' (0000000065586258): kobject_uevent_env [ 1157.966148] kobject: '0:49' (00000000c64084c1): kobject_uevent_env [ 1157.973118] kobject: 'batman_adv' (0000000065586258): kobject_uevent_env: filter function caused the event to drop! [ 1157.980230] kobject: '0:49' (00000000c64084c1): fill_kobj_path: path = '/devices/virtual/bdi/0:49' [ 1157.985383] kobject: 'batman_adv' (0000000065586258): kobject_cleanup, parent (null) [ 1158.007401] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1158.011570] kobject: 'batman_adv' (0000000065586258): calling ktype release [ 1158.011577] kobject: (0000000065586258): dynamic_kobj_release [ 1158.011587] kobject: 'batman_adv': free name [ 1158.011740] kobject: 'rx-0' (0000000094bf5b0d): kobject_cleanup, parent 00000000d0d373f9 10:33:02 executing program 4 (fault-call:0 fault-nth:12): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1158.036000] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1158.040341] kobject: 'rx-0' (0000000094bf5b0d): auto cleanup 'remove' event [ 1158.052015] kobject: '0:47' (0000000030a1edde): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1158.058856] kobject: 'rx-0' (0000000094bf5b0d): kobject_uevent_env [ 1158.060921] kobject: '0:49' (00000000c64084c1): kobject_uevent_env [ 1158.067956] kobject: 'rx-0' (0000000094bf5b0d): kobject_uevent_env: uevent_suppress caused the event to drop! 10:33:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) [ 1158.075504] kobject: '0:47' (0000000030a1edde): kobject_uevent_env [ 1158.082735] kobject: 'rx-0' (0000000094bf5b0d): auto cleanup kobject_del [ 1158.092075] kobject: '0:47' (0000000030a1edde): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1158.098322] kobject: 'rx-0' (0000000094bf5b0d): calling ktype release [ 1158.109484] kobject: '0:49' (00000000c64084c1): fill_kobj_path: path = '/devices/virtual/bdi/0:49' [ 1158.118550] kobject: 'rx-0': free name [ 1158.132731] kobject: 'loop3' (0000000015a5ca95): kobject_uevent_env [ 1158.138466] kobject: 'tx-0' (0000000066a8399f): kobject_cleanup, parent 00000000d0d373f9 [ 1158.163761] kobject: 'loop3' (0000000015a5ca95): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1158.175745] kobject: 'tx-0' (0000000066a8399f): auto cleanup 'remove' event [ 1158.177620] kobject: '0:49' (00000000c64084c1): kobject_cleanup, parent (null) [ 1158.219822] kobject: 'loop1' (00000000463a1cc1): kobject_uevent_env [ 1158.241939] kobject: '0:49' (00000000c64084c1): calling ktype release [ 1158.256493] kobject: 'tx-0' (0000000066a8399f): kobject_uevent_env [ 1158.258589] kobject: '0:49': free name [ 1158.282927] kobject: 'tx-0' (0000000066a8399f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1158.291925] kobject: 'loop1' (00000000463a1cc1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1158.304422] kobject: 'tx-0' (0000000066a8399f): auto cleanup kobject_del [ 1158.306444] kobject: 'loop0' (00000000e97107a8): kobject_uevent_env [ 1158.326903] kobject: 'tx-0' (0000000066a8399f): calling ktype release [ 1158.334028] kobject: 'loop0' (00000000e97107a8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1158.345624] FAULT_INJECTION: forcing a failure. [ 1158.345624] name failslab, interval 1, probability 0, space 0, times 0 [ 1158.349474] kobject: '0:46' (00000000db88202f): kobject_uevent_env [ 1158.358865] CPU: 1 PID: 19001 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1158.365228] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1158.368622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1158.368627] Call Trace: [ 1158.368650] dump_stack+0x172/0x1f0 [ 1158.368666] should_fail.cold+0xa/0x1b [ 1158.372780] kobject: '0:46' (00000000db88202f): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 1158.382598] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1158.382612] ? lock_downgrade+0x810/0x810 [ 1158.382626] ? set_page_refcounted+0x100/0x100 [ 1158.382641] ? ___might_sleep+0x163/0x280 [ 1158.382656] __should_failslab+0x121/0x190 [ 1158.392212] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1158.398927] should_failslab+0x9/0x14 [ 1158.398944] kmem_cache_alloc+0x2b2/0x6f0 [ 1158.412558] kobject: '0:46' (00000000db88202f): kobject_cleanup, parent (null) [ 1158.421362] ? lock_downgrade+0x810/0x810 [ 1158.421376] ? kasan_check_read+0x11/0x20 [ 1158.421388] ? kernfs_add_one+0x51/0x4d0 [ 1158.421414] __kernfs_new_node+0xef/0x690 [ 1158.421430] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1158.439379] kobject: '0:46' (00000000db88202f): calling ktype release [ 1158.439406] ? wait_for_completion+0x440/0x440 [ 1158.446689] kobject: '0:46': free name [ 1158.452985] ? kasan_check_write+0x14/0x20 [ 1158.453004] ? mutex_unlock+0xd/0x10 [ 1158.453016] ? kernfs_activate+0x192/0x1f0 [ 1158.453045] kernfs_new_node+0x99/0x130 [ 1158.453060] __kernfs_create_file+0x51/0x340 [ 1158.463185] kobject: 'tx-0': free name [ 1158.465003] sysfs_add_file_mode_ns+0x222/0x560 [ 1158.465023] internal_create_group+0x35b/0xc40 [ 1158.465040] ? remove_files.isra.0+0x190/0x190 [ 1158.468733] kobject: 'queues' (00000000d0d373f9): kobject_cleanup, parent (null) [ 1158.472543] ? bd_set_size+0x3f/0xb0 [ 1158.472564] sysfs_create_group+0x20/0x30 [ 1158.472580] lo_ioctl+0xf8f/0x20d0 [ 1158.472596] ? lo_rw_aio+0x1530/0x1530 [ 1158.472613] blkdev_ioctl+0xee8/0x1c40 [ 1158.481803] kobject: 'queues' (00000000d0d373f9): calling ktype release [ 1158.486813] ? blkpg_ioctl+0xa90/0xa90 [ 1158.486827] ? mark_held_locks+0x100/0x100 [ 1158.486843] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1158.491577] kobject: 'queues' (00000000d0d373f9): kset_release [ 1158.495563] ? kasan_check_read+0x11/0x20 [ 1158.495590] ? do_raw_spin_lock+0x12a/0x2e0 [ 1158.495604] ? lock_downgrade+0x810/0x810 [ 1158.499800] kobject: 'queues': free name [ 1158.503978] ? debug_check_no_obj_freed+0xbe/0x464 [ 1158.503994] block_ioctl+0xee/0x130 [ 1158.504006] ? blkdev_fallocate+0x410/0x410 [ 1158.504020] do_vfs_ioctl+0xd6e/0x1390 [ 1158.504034] ? ioctl_preallocate+0x210/0x210 [ 1158.504047] ? __fget+0x367/0x540 [ 1158.504064] ? iterate_fd+0x360/0x360 [ 1158.535454] kobject: 'veth1_to_team' (00000000cb9cd992): kobject_uevent_env [ 1158.538436] ? do_sys_open+0x31d/0x5d0 [ 1158.538459] ? security_file_ioctl+0x93/0xc0 [ 1158.542580] kobject: 'veth1_to_team' (00000000cb9cd992): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1158.546682] ksys_ioctl+0xab/0xd0 [ 1158.546697] __x64_sys_ioctl+0x73/0xb0 [ 1158.736129] do_syscall_64+0x103/0x610 [ 1158.740002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1158.745185] RIP: 0033:0x457c97 [ 1158.748370] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1158.767332] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1158.775025] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1158.782275] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1158.789559] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1158.796838] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1158.804102] R13: 0000000000000000 R14: 00000000004dbd08 R15: 0000000000000003 [ 1158.814889] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1158.817518] team0 (unregistering): Port device team_slave_0 removed [ 1158.822305] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1158.829336] kobject: 'batman_adv' (000000001b53fba5): kobject_uevent_env [ 1158.847885] kobject: 'batman_adv' (000000001b53fba5): kobject_uevent_env: filter function caused the event to drop! [ 1158.870288] kobject: '0:46' (00000000393571e5): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1158.873337] kobject: 'loop1' (00000000463a1cc1): kobject_uevent_env [ 1158.891824] kobject: 'loop1' (00000000463a1cc1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1158.895975] kobject: '0:46' (00000000393571e5): kobject_uevent_env [ 1158.902626] kobject: 'batman_adv' (000000001b53fba5): kobject_cleanup, parent (null) [ 1158.910918] kobject: '0:46' (00000000393571e5): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 1158.926822] kobject: 'loop3' (0000000015a5ca95): kobject_uevent_env [ 1158.929962] kobject: 'batman_adv' (000000001b53fba5): calling ktype release [ 1158.935902] kobject: 'loop3' (0000000015a5ca95): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1158.942091] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1158.951997] kobject: 'loop2' (000000007c80e940): kobject_uevent_env [ 1158.957272] kobject: (000000001b53fba5): dynamic_kobj_release [ 1158.966466] kobject: 'loop2' (000000007c80e940): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1158.969821] kobject: '0:46' (00000000393571e5): kobject_uevent_env [ 1158.988078] kobject: 'batman_adv': free name [ 1158.992704] kobject: 'rx-0' (00000000c1766e1c): kobject_cleanup, parent 0000000050d2cf9b [ 1158.995306] kobject: 'loop0' (00000000e97107a8): kobject_uevent_env [ 1159.003719] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1159.009211] kobject: 'loop0' (00000000e97107a8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1159.017286] kobject: 'rx-0' (00000000c1766e1c): auto cleanup 'remove' event [ 1159.027659] kobject: '0:46' (00000000393571e5): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 1159.036725] kobject: 'rx-0' (00000000c1766e1c): kobject_uevent_env [ 1159.049249] kobject: 'rx-0' (00000000c1766e1c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1159.058714] kobject: '0:49' (000000009d76575c): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1159.063186] kobject: 'rx-0' (00000000c1766e1c): auto cleanup kobject_del [ 1159.073734] kobject: '0:46' (00000000393571e5): kobject_cleanup, parent (null) [ 1159.088447] kobject: '0:49' (000000009d76575c): kobject_uevent_env [ 1159.102235] kobject: 'rx-0' (00000000c1766e1c): calling ktype release [ 1159.110730] kobject: '0:49' (000000009d76575c): fill_kobj_path: path = '/devices/virtual/bdi/0:49' [ 1159.129397] kobject: '0:46' (00000000393571e5): calling ktype release [ 1159.138238] kobject: 'rx-0': free name [ 1159.142396] kobject: '0:46': free name [ 1159.146621] kobject: 'tx-0' (00000000a19359ef): kobject_cleanup, parent 0000000050d2cf9b [ 1159.165223] kobject: 'tx-0' (00000000a19359ef): auto cleanup 'remove' event [ 1159.173138] kobject: 'loop4' (0000000013041a73): kobject_uevent_env 10:33:03 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0xffffff8c) 10:33:03 executing program 1: futex(&(0x7f000000cffc)=0xa07000, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:33:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:33:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) 10:33:03 executing program 4 (fault-call:0 fault-nth:13): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1159.179614] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1159.187963] kobject: '0:55' (00000000e8847b44): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1159.194720] kobject: 'tx-0' (00000000a19359ef): kobject_uevent_env [ 1159.200745] kobject: '0:55' (00000000e8847b44): kobject_uevent_env [ 1159.224465] kobject: '0:55' (00000000e8847b44): fill_kobj_path: path = '/devices/virtual/bdi/0:55' [ 1159.224500] kobject: '0:47' (0000000030a1edde): kobject_uevent_env [ 1159.258401] kobject: '0:47' (0000000030a1edde): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1159.264240] FAULT_INJECTION: forcing a failure. [ 1159.264240] name failslab, interval 1, probability 0, space 0, times 0 10:33:03 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x7) 10:33:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) [ 1159.274285] kobject: 'tx-0' (00000000a19359ef): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1159.298356] CPU: 0 PID: 19026 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1159.305569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1159.315005] Call Trace: [ 1159.316160] kobject: '0:47' (0000000030a1edde): kobject_cleanup, parent (null) [ 1159.317596] dump_stack+0x172/0x1f0 [ 1159.317614] should_fail.cold+0xa/0x1b [ 1159.317630] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1159.317647] ? lock_downgrade+0x810/0x810 [ 1159.327444] kobject: 'tx-0' (00000000a19359ef): auto cleanup kobject_del [ 1159.329497] ? set_page_refcounted+0x100/0x100 [ 1159.329513] ? ___might_sleep+0x163/0x280 [ 1159.329530] __should_failslab+0x121/0x190 [ 1159.334457] kobject: '0:47' (0000000030a1edde): calling ktype release [ 1159.338507] should_failslab+0x9/0x14 [ 1159.338527] kmem_cache_alloc+0x2b2/0x6f0 10:33:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:33:03 executing program 1: futex(&(0x7f000000cffc)=0x1000000, 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1159.338542] ? lock_downgrade+0x810/0x810 [ 1159.338556] ? kasan_check_read+0x11/0x20 [ 1159.338569] ? kernfs_add_one+0x51/0x4d0 [ 1159.338584] __kernfs_new_node+0xef/0x690 [ 1159.338600] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1159.343694] kobject: 'tx-0' (00000000a19359ef): calling ktype release [ 1159.349577] ? wait_for_completion+0x440/0x440 [ 1159.349593] ? kasan_check_write+0x14/0x20 [ 1159.349611] ? mutex_unlock+0xd/0x10 [ 1159.349624] ? kernfs_activate+0x192/0x1f0 [ 1159.349638] kernfs_new_node+0x99/0x130 [ 1159.349655] __kernfs_create_file+0x51/0x340 [ 1159.349672] sysfs_add_file_mode_ns+0x222/0x560 [ 1159.349691] internal_create_group+0x35b/0xc40 [ 1159.349715] ? remove_files.isra.0+0x190/0x190 [ 1159.355259] kobject: '0:47': free name [ 1159.358449] ? bd_set_size+0x3f/0xb0 [ 1159.358471] sysfs_create_group+0x20/0x30 [ 1159.358487] lo_ioctl+0xf8f/0x20d0 [ 1159.358505] ? lo_rw_aio+0x1530/0x1530 [ 1159.363080] kobject: 'tx-0': free name [ 1159.369325] blkdev_ioctl+0xee8/0x1c40 [ 1159.369340] ? blkpg_ioctl+0xa90/0xa90 [ 1159.369354] ? mark_held_locks+0x100/0x100 [ 1159.369369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.369386] ? timespec64_trunc+0xf0/0x180 [ 1159.369399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.369412] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1159.369430] ? kasan_check_read+0x11/0x20 [ 1159.375073] kobject: 'queues' (0000000050d2cf9b): kobject_cleanup, parent (null) [ 1159.377365] ? do_raw_spin_lock+0x12a/0x2e0 [ 1159.377380] ? lock_downgrade+0x810/0x810 [ 1159.377395] ? debug_check_no_obj_freed+0xbe/0x464 [ 1159.377411] block_ioctl+0xee/0x130 [ 1159.377423] ? blkdev_fallocate+0x410/0x410 [ 1159.377439] do_vfs_ioctl+0xd6e/0x1390 [ 1159.377454] ? ioctl_preallocate+0x210/0x210 [ 1159.382320] kobject: 'queues' (0000000050d2cf9b): calling ktype release [ 1159.385738] ? __fget+0x367/0x540 [ 1159.385754] ? iterate_fd+0x360/0x360 [ 1159.385769] ? do_sys_open+0x31d/0x5d0 [ 1159.385788] ? security_file_ioctl+0x93/0xc0 [ 1159.385803] ksys_ioctl+0xab/0xd0 [ 1159.385818] __x64_sys_ioctl+0x73/0xb0 [ 1159.385835] do_syscall_64+0x103/0x610 [ 1159.385854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1159.385865] RIP: 0033:0x457c97 [ 1159.385880] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1159.385891] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1159.401415] kobject: 'queues' (0000000050d2cf9b): kset_release [ 1159.405395] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 10:33:04 executing program 1: futex(&(0x7f000000cffc)=0x1f000000, 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1159.405404] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1159.405412] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1159.405420] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1159.405428] R13: 0000000000000000 R14: 00000000004dbd08 R15: 0000000000000003 [ 1159.411035] kobject: '0:55' (00000000e8847b44): kobject_uevent_env [ 1159.416201] kobject: 'queues': free name [ 1159.418132] kobject: '0:55' (00000000e8847b44): fill_kobj_path: path = '/devices/virtual/bdi/0:55' 10:33:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:33:04 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') ioctl$VT_RESIZE(r0, 0x5609, 0x0) [ 1159.418860] kobject: '0:55' (00000000e8847b44): kobject_cleanup, parent (null) [ 1159.423425] kobject: 'team_slave_0' (00000000fef684d7): kobject_uevent_env [ 1159.429331] kobject: '0:55' (00000000e8847b44): calling ktype release [ 1159.431767] kobject: 'team_slave_0' (00000000fef684d7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1159.436002] kobject: '0:55': free name [ 1159.436411] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1159.445519] kobject: 'batman_adv' (000000007369c2fc): kobject_uevent_env [ 1159.452531] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1159.453277] kobject: 'batman_adv' (000000007369c2fc): kobject_uevent_env: filter function caused the event to drop! [ 1159.457435] kobject: '0:49' (000000009d76575c): kobject_uevent_env [ 1159.461243] kobject: 'batman_adv' (000000007369c2fc): kobject_cleanup, parent (null) [ 1159.466000] kobject: '0:49' (000000009d76575c): fill_kobj_path: path = '/devices/virtual/bdi/0:49' [ 1159.468778] kobject: 'batman_adv' (000000007369c2fc): calling ktype release [ 1159.476013] kobject: '0:49' (000000009d76575c): kobject_cleanup, parent (null) [ 1159.506776] kobject: (000000007369c2fc): dynamic_kobj_release [ 1159.516129] kobject: 'loop3' (0000000015a5ca95): kobject_uevent_env [ 1159.520304] kobject: 'batman_adv': free name [ 1159.530019] kobject: 'loop3' (0000000015a5ca95): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1159.550996] kobject: '0:49' (000000009d76575c): calling ktype release [ 1159.559353] kobject: 'loop0' (00000000e97107a8): kobject_uevent_env [ 1159.573977] kobject: 'rx-0' (000000000f89f282): kobject_cleanup, parent 000000007991b7b5 [ 1159.580923] kobject: 'loop0' (00000000e97107a8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1159.597944] kobject: '0:49': free name [ 1159.619093] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1159.637167] kobject: 'rx-0' (000000000f89f282): auto cleanup 'remove' event [ 1159.660077] kobject: '0:47' (00000000d6704c83): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1159.678536] kobject: 'rx-0' (000000000f89f282): kobject_uevent_env [ 1159.689038] kobject: 'loop1' (00000000463a1cc1): kobject_uevent_env [ 1159.692588] kobject: 'rx-0' (000000000f89f282): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1159.697648] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1159.708713] kobject: 'rx-0' (000000000f89f282): auto cleanup kobject_del [ 1159.715240] kobject: 'loop1' (00000000463a1cc1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1159.719344] kobject: 'rx-0' (000000000f89f282): calling ktype release [ 1159.734256] kobject: 'loop5' (000000003cbebe53): kobject_uevent_env [ 1159.751567] kobject: 'rx-0': free name [ 1159.766960] kobject: '0:47' (00000000d6704c83): kobject_uevent_env [ 1159.772202] kobject: 'tx-0' (00000000d7ba295e): kobject_cleanup, parent 000000007991b7b5 [ 1159.785371] kobject: 'loop5' (000000003cbebe53): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1159.788008] kobject: 'tx-0' (00000000d7ba295e): auto cleanup 'remove' event [ 1159.802028] kobject: '0:47' (00000000d6704c83): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1159.830204] kobject: 'tx-0' (00000000d7ba295e): kobject_uevent_env [ 1159.856546] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1159.873283] kobject: 'tx-0' (00000000d7ba295e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1159.878500] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1159.896177] kobject: 'tx-0' (00000000d7ba295e): auto cleanup kobject_del [ 1159.904322] kobject: 'loop1' (00000000463a1cc1): kobject_uevent_env [ 1159.912444] kobject: 'tx-0' (00000000d7ba295e): calling ktype release [ 1159.936336] kobject: '0:46' (000000008b7b365a): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1159.948328] kobject: 'tx-0': free name [ 1159.961199] kobject: 'loop1' (00000000463a1cc1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1159.968364] kobject: 'queues' (000000007991b7b5): kobject_cleanup, parent (null) [ 1159.983708] kobject: 'loop0' (00000000e97107a8): kobject_uevent_env [ 1159.990986] kobject: '0:46' (000000008b7b365a): kobject_uevent_env [ 1160.002801] kobject: 'loop0' (00000000e97107a8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1160.011252] kobject: 'queues' (000000007991b7b5): calling ktype release [ 1160.017283] kobject: 'loop2' (000000007c80e940): kobject_uevent_env [ 1160.025903] kobject: 'queues' (000000007991b7b5): kset_release [ 1160.032300] kobject: 'loop2' (000000007c80e940): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1160.040157] kobject: '0:46' (000000008b7b365a): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 1160.043618] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1160.093788] kobject: '0:55' (00000000f1f0737d): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1160.097465] kobject: 'queues': free name [ 1160.106995] kobject: '0:55' (00000000f1f0737d): kobject_uevent_env [ 1160.111958] kobject: 'veth0_to_team' (00000000dc5f06f4): kobject_uevent_env [ 1160.121136] kobject: '0:55' (00000000f1f0737d): fill_kobj_path: path = '/devices/virtual/bdi/0:55' [ 1160.127201] kobject: 'veth0_to_team' (00000000dc5f06f4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1160.140288] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1160.148527] kobject: 'bonding_slave' (000000000dd0f8d5): kobject_cleanup, parent 00000000f871b07b [ 1160.170249] kobject: 'loop1' (00000000463a1cc1): kobject_uevent_env [ 1160.173833] kobject: 'bonding_slave' (000000000dd0f8d5): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 1160.173840] kobject: 'bonding_slave' (000000000dd0f8d5): auto cleanup kobject_del [ 1160.173852] kobject: 'bonding_slave': free name [ 1160.225354] kobject: 'loop1' (00000000463a1cc1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1160.226415] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1160.239940] kobject: 'loop3' (0000000015a5ca95): kobject_uevent_env [ 1160.249251] kobject: 'loop3' (0000000015a5ca95): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1160.249364] kobject: '0:55' (00000000f1f0737d): kobject_uevent_env [ 1160.259470] kobject: 'loop0' (00000000e97107a8): kobject_uevent_env [ 1160.270359] kobject: '0:55' (00000000f1f0737d): fill_kobj_path: path = '/devices/virtual/bdi/0:55' [ 1160.277410] kobject: 'loop0' (00000000e97107a8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1160.281092] kobject: '0:55' (00000000f1f0737d): kobject_cleanup, parent (null) [ 1160.311039] kobject: '0:55' (00000000f1f0737d): calling ktype release [ 1160.312977] kobject: 'batman_adv' (00000000183dbc14): kobject_uevent_env [ 1160.317972] kobject: '0:55': free name [ 1160.352018] kobject: 'batman_adv' (00000000183dbc14): kobject_uevent_env: filter function caused the event to drop! [ 1160.366743] kobject: 'batman_adv' (00000000183dbc14): kobject_cleanup, parent (null) [ 1160.371388] kobject: '0:49' (000000004df4cdd1): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1160.385490] kobject: 'batman_adv' (00000000183dbc14): calling ktype release [ 1160.396665] kobject: '0:46' (000000008b7b365a): kobject_uevent_env [ 1160.404440] kobject: '0:49' (000000004df4cdd1): kobject_uevent_env [ 1160.405493] kobject: (00000000183dbc14): dynamic_kobj_release [ 1160.420685] kobject: '0:49' (000000004df4cdd1): fill_kobj_path: path = '/devices/virtual/bdi/0:49' [ 1160.422077] kobject: '0:46' (000000008b7b365a): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 1160.432501] kobject: 'batman_adv': free name [ 1160.444465] kobject: 'rx-0' (00000000e1773efd): kobject_cleanup, parent 00000000d7a3309d [ 1160.446962] kobject: '0:46' (000000008b7b365a): kobject_cleanup, parent (null) [ 1160.461114] kobject: 'rx-0' (00000000e1773efd): auto cleanup 'remove' event [ 1160.461123] kobject: 'rx-0' (00000000e1773efd): kobject_uevent_env [ 1160.461131] kobject: 'rx-0' (00000000e1773efd): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1160.461141] kobject: 'rx-0' (00000000e1773efd): auto cleanup kobject_del [ 1160.472338] kobject: '0:46' (000000008b7b365a): calling ktype release [ 1160.479921] kobject: 'rx-0' (00000000e1773efd): calling ktype release [ 1160.498261] kobject: '0:49' (000000004df4cdd1): kobject_uevent_env [ 1160.505098] kobject: '0:46': free name [ 1160.514445] kobject: '0:49' (000000004df4cdd1): fill_kobj_path: path = '/devices/virtual/bdi/0:49' [ 1160.515692] kobject: 'rx-0': free name [ 1160.527135] kobject: '0:49' (000000004df4cdd1): kobject_cleanup, parent (null) [ 1160.528787] kobject: 'tx-0' (00000000ad0a9cc4): kobject_cleanup, parent 00000000d7a3309d [ 1160.540623] kobject: '0:49' (000000004df4cdd1): calling ktype release 10:33:05 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0xfffffff6) 10:33:05 executing program 4 (fault-call:0 fault-nth:14): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:33:05 executing program 1: futex(&(0x7f000000cffc)=0xff600000, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:33:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) fcntl$getown(r1, 0x9) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:33:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) 10:33:05 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x10) [ 1160.545792] kobject: 'tx-0' (00000000ad0a9cc4): auto cleanup 'remove' event [ 1160.555263] kobject: '0:49': free name [ 1160.559423] kobject: 'tx-0' (00000000ad0a9cc4): kobject_uevent_env [ 1160.570357] kobject: 'tx-0' (00000000ad0a9cc4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1160.592693] kobject: 'tx-0' (00000000ad0a9cc4): auto cleanup kobject_del 10:33:05 executing program 1: futex(&(0x7f000000cffc)=0x400000000000, 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1160.598715] kobject: 'loop2' (000000007c80e940): kobject_uevent_env [ 1160.611737] kobject: 'tx-0' (00000000ad0a9cc4): calling ktype release [ 1160.618002] kobject: 'loop2' (000000007c80e940): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1160.621711] kobject: 'tx-0': free name [ 1160.633010] kobject: '0:47' (00000000d6704c83): kobject_uevent_env [ 1160.634462] kobject: 'queues' (00000000d7a3309d): kobject_cleanup, parent (null) [ 1160.643662] kobject: '0:47' (00000000d6704c83): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1160.647913] FAULT_INJECTION: forcing a failure. [ 1160.647913] name failslab, interval 1, probability 0, space 0, times 0 [ 1160.662851] kobject: '0:47' (00000000d6704c83): kobject_cleanup, parent (null) [ 1160.672909] kobject: 'queues' (00000000d7a3309d): calling ktype release [ 1160.692148] kobject: 'queues' (00000000d7a3309d): kset_release 10:33:05 executing program 3: ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) [ 1160.707873] kobject: 'queues': free name [ 1160.712201] CPU: 0 PID: 19073 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1160.718348] kobject: '0:47' (00000000d6704c83): calling ktype release [ 1160.719397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1160.719402] Call Trace: [ 1160.719424] dump_stack+0x172/0x1f0 [ 1160.719441] should_fail.cold+0xa/0x1b [ 1160.719457] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1160.719472] ? lock_downgrade+0x810/0x810 [ 1160.719489] ? set_page_refcounted+0x100/0x100 [ 1160.744317] kobject: '0:47': free name [ 1160.745495] ? ___might_sleep+0x163/0x280 [ 1160.745512] __should_failslab+0x121/0x190 [ 1160.745544] should_failslab+0x9/0x14 [ 1160.745569] kmem_cache_alloc+0x2b2/0x6f0 [ 1160.745583] ? lock_downgrade+0x810/0x810 [ 1160.745596] ? kasan_check_read+0x11/0x20 [ 1160.745612] ? kernfs_add_one+0x51/0x4d0 [ 1160.766734] kobject: 'bond_slave_1' (00000000f871b07b): kobject_uevent_env [ 1160.767480] __kernfs_new_node+0xef/0x690 [ 1160.767496] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1160.767514] ? wait_for_completion+0x440/0x440 [ 1160.767530] ? kasan_check_write+0x14/0x20 [ 1160.767550] ? mutex_unlock+0xd/0x10 [ 1160.767565] ? kernfs_activate+0x192/0x1f0 [ 1160.772416] kobject: 'bond_slave_1' (00000000f871b07b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1160.775586] kernfs_new_node+0x99/0x130 [ 1160.775603] __kernfs_create_file+0x51/0x340 [ 1160.775620] sysfs_add_file_mode_ns+0x222/0x560 [ 1160.775640] internal_create_group+0x35b/0xc40 [ 1160.775655] ? trace_hardirqs_on+0x67/0x230 10:33:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') dup2(r0, r0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 1160.775674] ? remove_files.isra.0+0x190/0x190 [ 1160.775686] ? bd_set_size+0x3f/0xb0 [ 1160.775706] sysfs_create_group+0x20/0x30 [ 1160.781788] kobject: 'batman_adv' (000000004d1dab60): kobject_uevent_env [ 1160.783981] lo_ioctl+0xf8f/0x20d0 [ 1160.784000] ? lo_rw_aio+0x1530/0x1530 [ 1160.784017] blkdev_ioctl+0xee8/0x1c40 [ 1160.784033] ? blkpg_ioctl+0xa90/0xa90 [ 1160.784047] ? mark_held_locks+0x100/0x100 [ 1160.784062] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1160.784081] ? kasan_check_read+0x11/0x20 [ 1160.788492] kobject: 'batman_adv' (000000004d1dab60): kobject_uevent_env: filter function caused the event to drop! [ 1160.792271] ? do_raw_spin_lock+0x12a/0x2e0 [ 1160.792287] ? lock_downgrade+0x810/0x810 [ 1160.792302] ? debug_check_no_obj_freed+0xbe/0x464 [ 1160.792318] block_ioctl+0xee/0x130 [ 1160.792331] ? blkdev_fallocate+0x410/0x410 [ 1160.792346] do_vfs_ioctl+0xd6e/0x1390 [ 1160.792363] ? ioctl_preallocate+0x210/0x210 [ 1160.799858] kobject: 'batman_adv' (000000004d1dab60): kobject_cleanup, parent (null) [ 1160.803506] ? __fget+0x367/0x540 [ 1160.803522] ? iterate_fd+0x360/0x360 [ 1160.803542] ? do_sys_open+0x31d/0x5d0 [ 1160.803563] ? security_file_ioctl+0x93/0xc0 [ 1160.820972] kobject: 'batman_adv' (000000004d1dab60): calling ktype release [ 1160.825034] ksys_ioctl+0xab/0xd0 [ 1160.825050] __x64_sys_ioctl+0x73/0xb0 [ 1160.825068] do_syscall_64+0x103/0x610 [ 1160.825086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1160.825101] RIP: 0033:0x457c97 [ 1160.836818] kobject: (000000004d1dab60): dynamic_kobj_release [ 1160.840307] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1160.840328] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1160.840341] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1160.840353] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1160.845149] kobject: 'batman_adv': free name 10:33:05 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x60) [ 1160.849429] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1160.849438] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1160.849446] R13: 0000000000000000 R14: 00000000004dbd08 R15: 0000000000000003 [ 1160.864989] kobject: '0:47' (0000000087b0b9c9): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1160.872790] kobject: 'rx-0' (00000000fab94d1a): kobject_cleanup, parent 000000000ec1e0da [ 1160.881928] kobject: '0:47' (0000000087b0b9c9): kobject_uevent_env [ 1160.888216] kobject: 'rx-0' (00000000fab94d1a): auto cleanup 'remove' event 10:33:05 executing program 1: futex(&(0x7f000000cffc)=0x60ffffffffff, 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1160.890505] kobject: '0:47' (0000000087b0b9c9): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1160.894595] kobject: 'rx-0' (00000000fab94d1a): kobject_uevent_env [ 1160.904757] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1160.913209] kobject: 'rx-0' (00000000fab94d1a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1160.927804] kobject: '0:49' (00000000babe0f87): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1160.935420] kobject: 'rx-0' (00000000fab94d1a): auto cleanup kobject_del 10:33:05 executing program 3: ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) [ 1160.937001] kobject: '0:49' (00000000babe0f87): kobject_uevent_env [ 1160.940709] kobject: 'rx-0' (00000000fab94d1a): calling ktype release [ 1160.944971] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1160.949271] kobject: 'rx-0': free name [ 1160.958076] kobject: '0:49' (00000000babe0f87): fill_kobj_path: path = '/devices/virtual/bdi/0:49' [ 1160.965087] kobject: 'tx-0' (000000003f7f4097): kobject_cleanup, parent 000000000ec1e0da [ 1160.997330] kobject: 'loop1' (00000000463a1cc1): kobject_uevent_env [ 1161.014268] kobject: 'tx-0' (000000003f7f4097): auto cleanup 'remove' event [ 1161.046025] kobject: 'loop1' (00000000463a1cc1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1161.054463] kobject: 'tx-0' (000000003f7f4097): kobject_uevent_env [ 1161.063034] kobject: 'loop3' (0000000015a5ca95): kobject_uevent_env [ 1161.074565] kobject: 'tx-0' (000000003f7f4097): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1161.079620] kobject: 'loop3' (0000000015a5ca95): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1161.088928] kobject: 'tx-0' (000000003f7f4097): auto cleanup kobject_del [ 1161.098484] kobject: 'loop5' (000000003cbebe53): kobject_uevent_env [ 1161.104454] kobject: 'tx-0' (000000003f7f4097): calling ktype release [ 1161.106575] kobject: '0:49' (00000000babe0f87): kobject_uevent_env [ 1161.140433] kobject: 'tx-0': free name [ 1161.154337] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1161.166280] kobject: '0:46' (000000000a12976f): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1161.168010] kobject: 'loop5' (000000003cbebe53): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1161.192724] kobject: '0:46' (000000000a12976f): kobject_uevent_env [ 1161.198445] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1161.211302] kobject: 'queues' (000000000ec1e0da): kobject_cleanup, parent (null) [ 1161.221580] kobject: '0:49' (00000000babe0f87): fill_kobj_path: path = '/devices/virtual/bdi/0:49' [ 1161.253421] kobject: 'queues' (000000000ec1e0da): calling ktype release [ 1161.254397] kobject: 'loop0' (00000000e97107a8): kobject_uevent_env [ 1161.264694] kobject: '0:46' (000000000a12976f): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 1161.267440] kobject: 'loop0' (00000000e97107a8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1161.297204] kobject: 'queues' (000000000ec1e0da): kset_release [ 1161.320274] kobject: '0:49' (00000000babe0f87): kobject_cleanup, parent (null) [ 1161.356989] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1161.379152] kobject: '0:49' (00000000babe0f87): calling ktype release [ 1161.389827] kobject: 'queues': free name [ 1161.396344] kobject: '0:49': free name [ 1161.406830] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1161.418329] kobject: 'veth1_to_bond' (0000000054608715): kobject_uevent_env [ 1161.424241] kobject: 'loop3' (0000000015a5ca95): kobject_uevent_env [ 1161.430031] kobject: 'veth1_to_bond' (0000000054608715): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1161.445743] kobject: '0:47' (0000000087b0b9c9): kobject_uevent_env [ 1161.451536] kobject: 'loop3' (0000000015a5ca95): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1161.453216] kobject: 'bonding_slave' (00000000c95f8741): kobject_cleanup, parent 00000000e2410ec5 [ 1161.471539] kobject: '0:47' (0000000087b0b9c9): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1161.477104] kobject: 'loop1' (00000000463a1cc1): kobject_uevent_env [ 1161.481526] kobject: '0:47' (0000000087b0b9c9): kobject_cleanup, parent (null) [ 1161.499623] kobject: 'loop1' (00000000463a1cc1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1161.499887] kobject: 'bonding_slave' (00000000c95f8741): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 1161.515220] kobject: 'loop4' (0000000013041a73): kobject_uevent_env [ 1161.523642] kobject: '0:47' (0000000087b0b9c9): calling ktype release [ 1161.533656] kobject: 'loop4' (0000000013041a73): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1161.536848] kobject: 'bonding_slave' (00000000c95f8741): auto cleanup kobject_del [ 1161.549192] kobject: '0:47': free name [ 1161.553583] kobject: 'bonding_slave': free name [ 1161.558895] kobject: 'loop0' (00000000e97107a8): kobject_uevent_env [ 1161.568573] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1161.569138] kobject: 'loop0' (00000000e97107a8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1161.606139] kobject: 'loop2' (000000007c80e940): kobject_uevent_env [ 1161.617348] kobject: 'loop2' (000000007c80e940): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1161.624794] kobject: 'batman_adv' (00000000e99fa3bd): kobject_uevent_env [ 1161.635489] kobject: 'batman_adv' (00000000e99fa3bd): kobject_uevent_env: filter function caused the event to drop! [ 1161.650573] kobject: 'batman_adv' (00000000e99fa3bd): kobject_cleanup, parent (null) [ 1161.659926] kobject: 'batman_adv' (00000000e99fa3bd): calling ktype release [ 1161.671254] kobject: (00000000e99fa3bd): dynamic_kobj_release [ 1161.678731] kobject: 'batman_adv': free name [ 1161.683578] kobject: 'rx-0' (00000000d6274f90): kobject_cleanup, parent 000000009c79eab4 [ 1161.689330] kobject: '0:47' (0000000030096bcb): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1161.692246] kobject: 'rx-0' (00000000d6274f90): auto cleanup 'remove' event [ 1161.692254] kobject: 'rx-0' (00000000d6274f90): kobject_uevent_env [ 1161.692262] kobject: 'rx-0' (00000000d6274f90): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1161.692269] kobject: 'rx-0' (00000000d6274f90): auto cleanup kobject_del [ 1161.692295] kobject: 'rx-0' (00000000d6274f90): calling ktype release [ 1161.692300] kobject: 'rx-0': free name [ 1161.692341] kobject: 'tx-0' (00000000ae91a324): kobject_cleanup, parent 000000009c79eab4 [ 1161.692348] kobject: 'tx-0' (00000000ae91a324): auto cleanup 'remove' event [ 1161.692355] kobject: 'tx-0' (00000000ae91a324): kobject_uevent_env [ 1161.692364] kobject: 'tx-0' (00000000ae91a324): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1161.692370] kobject: 'tx-0' (00000000ae91a324): auto cleanup kobject_del [ 1161.692401] kobject: 'tx-0' (00000000ae91a324): calling ktype release [ 1161.692405] kobject: 'tx-0': free name [ 1161.692446] kobject: 'queues' (000000009c79eab4): kobject_cleanup, parent (null) [ 1161.692453] kobject: 'queues' (000000009c79eab4): calling ktype release [ 1161.692460] kobject: 'queues' (000000009c79eab4): kset_release [ 1161.692489] kobject: 'queues': free name [ 1161.710340] kobject: '0:47' (0000000030096bcb): kobject_uevent_env [ 1161.716416] kobject: 'bond_slave_0' (00000000e2410ec5): kobject_uevent_env [ 1161.726596] kobject: '0:47' (0000000030096bcb): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1161.735457] kobject: 'bond_slave_0' (00000000e2410ec5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1161.773186] kobject: '0:55' (000000008a841671): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1161.777146] kobject: 'batman_adv' (00000000d0f74c57): kobject_uevent_env [ 1161.786660] kobject: '0:55' (000000008a841671): kobject_uevent_env [ 1161.788665] kobject: 'batman_adv' (00000000d0f74c57): kobject_uevent_env: filter function caused the event to drop! [ 1161.792413] kobject: '0:55' (000000008a841671): fill_kobj_path: path = '/devices/virtual/bdi/0:55' [ 1161.803580] kobject: 'batman_adv' (00000000d0f74c57): kobject_cleanup, parent (null) [ 1161.871548] kobject: '0:57' (0000000045c2cb67): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1161.874304] kobject: 'batman_adv' (00000000d0f74c57): calling ktype release [ 1161.888236] kobject: '0:57' (0000000045c2cb67): kobject_uevent_env [ 1161.893623] kobject: (00000000d0f74c57): dynamic_kobj_release [ 1161.893634] kobject: 'batman_adv': free name [ 1161.893771] kobject: 'rx-0' (0000000070f9aa09): kobject_cleanup, parent 000000001bd42084 [ 1161.905556] kobject: '0:55' (000000008a841671): kobject_uevent_env [ 1161.911717] kobject: 'rx-0' (0000000070f9aa09): auto cleanup 'remove' event [ 1161.911725] kobject: 'rx-0' (0000000070f9aa09): kobject_uevent_env [ 1161.911733] kobject: 'rx-0' (0000000070f9aa09): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1161.911739] kobject: 'rx-0' (0000000070f9aa09): auto cleanup kobject_del [ 1161.911766] kobject: 'rx-0' (0000000070f9aa09): calling ktype release [ 1161.911770] kobject: 'rx-0': free name [ 1161.911809] kobject: 'tx-0' (0000000013234e4b): kobject_cleanup, parent 000000001bd42084 [ 1161.911816] kobject: 'tx-0' (0000000013234e4b): auto cleanup 'remove' event [ 1161.911826] kobject: 'tx-0' (0000000013234e4b): kobject_uevent_env [ 1161.919288] kobject: '0:55' (000000008a841671): fill_kobj_path: path = '/devices/virtual/bdi/0:55' [ 1161.925297] kobject: 'tx-0' (0000000013234e4b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1161.925305] kobject: 'tx-0' (0000000013234e4b): auto cleanup kobject_del [ 1161.925340] kobject: 'tx-0' (0000000013234e4b): calling ktype release [ 1161.925344] kobject: 'tx-0': free name [ 1161.925360] kobject: 'queues' (000000001bd42084): kobject_cleanup, parent (null) [ 1161.925370] kobject: 'queues' (000000001bd42084): calling ktype release [ 1161.936125] kobject: '0:57' (0000000045c2cb67): fill_kobj_path: path = '/devices/virtual/bdi/0:57' [ 1161.957664] kobject: 'queues' (000000001bd42084): kset_release [ 1161.957674] kobject: 'queues': free name [ 1161.958030] kobject: 'veth0_to_bond' (0000000094ba509e): kobject_uevent_env [ 1161.968602] kobject: '0:55' (000000008a841671): kobject_cleanup, parent (null) [ 1161.974887] kobject: 'veth0_to_bond' (0000000094ba509e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1161.984034] kobject: '0:55' (000000008a841671): calling ktype release [ 1161.988383] kobject: 'batman_adv' (000000000b62bda0): kobject_uevent_env [ 1161.992034] kobject: '0:55': free name [ 1161.999859] kobject: 'batman_adv' (000000000b62bda0): kobject_uevent_env: filter function caused the event to drop! [ 1162.138988] kobject: '0:57' (0000000045c2cb67): kobject_uevent_env [ 1162.140634] kobject: 'batman_adv' (000000000b62bda0): kobject_cleanup, parent (null) [ 1162.150100] kobject: '0:47' (0000000030096bcb): kobject_uevent_env [ 1162.154325] kobject: 'batman_adv' (000000000b62bda0): calling ktype release [ 1162.160859] kobject: '0:47' (0000000030096bcb): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 1162.167673] kobject: (000000000b62bda0): dynamic_kobj_release [ 1162.167687] kobject: 'batman_adv': free name [ 1162.167827] kobject: 'rx-0' (0000000064d705ec): kobject_cleanup, parent 000000008017567f [ 1162.180437] kobject: '0:57' (0000000045c2cb67): fill_kobj_path: path = '/devices/virtual/bdi/0:57' [ 1162.182907] kobject: 'rx-0' (0000000064d705ec): auto cleanup 'remove'