16a47ddd9bf7c7eb2b7411ffe14c7577786e571d1c58d869107cc699468e31e76348e9835e6d1e688d61f93bb4e84929d3ba01e653213cf633f880f7f293ac6a5fd688371da0752ef16de6fa850ed21bbc7fb5522047e7ce084625a9e9db58b1105be9462a85fb843c3341074afdd7143d0e7155cbb1715def86353d1356da55427845ac9578a98c3f6ef9540a5b383e5162a5c3b5050632a36b1608dc642efe55cefc48b1e3f6577be3bafd729e6ac076e032fa97ef9f277b05cd950bdab91478f88b8bfdd47a798dbda6e422f7a1757b0af740019d68aaf2424a9361e9b5ade05bba471c7796f8e7ab5272c83771ca7b092c06aca147301b55efa2db6056aa6cd16ef6faa128e9befa4819719434316ea2183a3e0baf051b78c415fa211abd8e8f95ef2f8a54ef0591140bf2902fcde99e9fdae932512c1e4d86b0c4bb6b9c2e08c5724bdea06630460e43ed74f8e8ecd16426f15be8f2216de9d5163d7b16bfe211c91a57422a9453dbc6e48ba74b4360a9e86d2af388f394e0e877deea01f7eaf56777e35b0170728155ddc760a24d6cf9a0627fd02ba558963d62f55a7272da596dfe1ae22261de06123171f04a0075034348cd0c4f13d14b392ac70f77098902c392560a7c6b0b62550dad4133abafed7e1f00475f3862da833d0dd020b75ce591705390d84e24dfb51676f67d4791f3d914b8f8e9196631a4c0240b6698adc57afba22357388adf99ed7fad77577c94ca17b414077e9834704c83f168b253e539f79ba7fb32be551218f8d9d1981a4621849e135bb57bd7583809f4dd742b7583d7ecf186db1d27a2a4f42d8cd124b904aa6396a1b77480840551630f8d5aaf001ec9371466335dcb119bb4e38506ff2e21e2c062976afd124516731a843cf408458b8370eafcc0a5d0b0f8bdcbf9c14898b4d99f09f17a73f98a21c088d5a40740e79ec1999c431b3c450106f2283c89a5d5e8fa688777ffed8a3310a5e9bb2dc93441487254d8963701eb4c857adede7513b3fa02903875abd7f293abe15c72f6c88c76be31b6d4ee653c21936d20aaa686964433642dbc1945655c4c33dab5bd0b0064dcd463b4332af47246cba86d6a9ac99e6d061feb64a684266fd2f8829e922d91b5158c6777fdf97c63b993f6d750469a4d8d41b6fbcea6ca3d426162992b870b0717fe9f9fa9d46fd6902212351f2d1cecbabff3130bae9a5e401bb3a5d35d45abff8df2284982d1a1a594ed0bcdde528d3a5947ec3c4933732af62eb876d1c5f3ab76efb264e45ca91407dd3aa6b7a1be61bd95513c4d16c6816c1d17391b19e5084557f8e2631e91fcfca56339d9c03f73616948a76bc0e903f146e0f8007d4e344e5c7b94d576815fd22858bccd44ed534d50651113d3377ae256b1d015246c83f6063d1c8a40009591bef2c6e431df546f29da38e7befbfcdb2ec588a8f81249766f2e098f75c14f772372c94a2446280d9e7b42a20dfb599f3ab365172499df5b2d88b5da3fc64d511792e5e166049fa8b965482eb0d9595b044a683894cf2d32682df24bee5c212b761b9204a06148bcbeb39b006d1dac1b2dc458766597bc44ad62b072f606f30a3367c9dacbedd07fda7619a2452586df8c88b3c91110e24c7230c60de15db94c7abccbd29741cb03aef9b74258782ea7dfca2c2d82ced61462898eb92e3b7f861680bdeac29e659c5ab95be1f069410d1b6eaa4e40038d4e82f4fd9ae0c7e8222329a15aa7e84b569372eebf59a3755817b3ec2db831be091e115ddedfcd08b38b0b9b7f1f25d707ef906edd1315a4acd29691987dce126f9b6edb3fd9d738768104ae73018f8a3963f9511a356f8c7d4067b411cc891ebe4490668f2788da28045e675f19c4c24506f58b59861122c047d02f6cafa7cb64872ea179b22df9f3f18ad0ac7bf8fce94bad934e882226d6d8812c06e174d4fcefe9b81d5738c60975b89de6e36bb7a7b943e6d6d2d90f85a8c5956b9fe16a37f7d87f96060eb97da6eccf4e169e52994830d7803b23bf1be59643c6d9af405aa348ce1718f8aa30dcfee7491a3d8ed9276e2819177e57233bf9de0386c21c57b4943c2d8395fe2e18d94cfccb8a6cc53abf4e310e1bce06da99fb774e535f2b1908673b687dab5282ce7b8dec29ff435a5a5e7495513915dab416b554277b3ef0d1f37d7f10024a101c7051c7f13f8bb842ca9c28ddd87f5779052bc145dde6b508ced79b8531a4d5fd24f8ff1fc66f1365a439b6926b20e9e4639bcbadbad882238fcb5a2ba2d1b31ec4513bf406e53eb0065065af0918b97a33d8bec56f5c07553d090fd7a95a59a1db404d09826378328bb618a0c800ccdacfc280b2c6d5207f2e16ad203a27188eb70b602f8a23ad3ff7306f6f59cdc80f25641d33c0cac73a7cc5ec6c4f353777aae438125bff1e4e593b34c503c80525654ce0d6822c3be7e12e200a788a9af5d4a9f16741f6ddde3681431a758ab6cc926e0dadc6df05f0cd2f9ec76838c3967c82b91966fe24c04abfb387258b1cbefbfe5cc23e51dcd9138ca004d74fa688aee943c9c3c5e85cb3f3e6b01d1db8ba5ab055453fb270b5ddbb64010ffba8f8c3ad040cac6169a3b8288b10dd5968b22add3aad18e47071347406cf45e62c855382c1a2b5aa68f0f0a2d10ec8857854a7422f5e53a24419ffd0279e158a1d57fd355848fed355687f62688c54e9b20db397c95bb7c6f3deb1b33ee2d8dc5f3429e9875307dddabbc8b437cfe071f747eb56a32b9401424ea9b96e69634b5898bb916d0a1d1c785a8904e8134327b6537e9c590d1f4be8c66bb063fade7980931c58b8987e3b7022cec4072f8011502051648b5baf39cf5d644c800c881c67861ab8fc60471f0fed8108534dd34ddf076d4631f9640a46f2e763a85dc7f27a03f8063bdb9b65c004f22afb07380349749c25bb5021885a247a4799e4ee25f705b7264ab21a6a61bef6dbc72217da95946011f05337b569c0ef20a626635017d43006f739f0733edef5c9c53fd510aa433ab7ba3cd1a67c6c6e7fb2e348d891f8a66f335eda1bf50eb618ae001d7cf32283be7b263fb3dc14401ae79a312ad6e706b2b79fcadb2ca8187845aa13b2b0b2cfe597422b99f16a7722dfeaa1a380cba9274aba00d2c1489f1f5867721cc58c617a56dc662471a55398dc816d9cd991a3bb95db60877e748c74613c0b9b4450559d0b8f7daeaaae496be43146a8a0073bc194158f4c69c69dc3abd9ca402b9cea27eccd2b0e598cb36d64a2730ac589fb95588df"}) 10:31:20 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:20 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:20 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:20 executing program 3: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f4360000000000"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "245546e1b57a01fc0b7a2bf349f3ba806c772a2b436327706a3117050605b942ca899b86cc056ef712f787b24f5b94917cce765f2ddb44d30616bc32318a3d6cf1d1097dcfb571e984efb3856f3aa6810394d9bec693630611a624fd2cead37c13b942da855781b9f2267390881810c0c831d0f2991c3671734341bb7d2b15ec06be5ca6e65f89faa61faab4883e69654b73877afd3a392eeeb89dae8b149dbb00dafa792211c194a0bccbf549d196ab3f82d5d6b3b038787dd8f980d42f18f74beb947371dee8db5a1f0b71e6249ca040fdd2b4d66a83c3a9ed828d3447dfb659731a28ed3be3da94d339dca3cb80248428f229bc11f40555866c4524ce0271ab34bece9d19f5a7ae2659bd408c7ddf9a25415fafdadb36864be3ac3aa0f04c9f981dd209e5f641e7d3baff72b0d0f3abff731618ff41afb483d7c2a8a1029bfa255e2aa96fb580c1eef7b5e84f7df0d2dba962afcb9a2a770e36bf93999465e6737dd57e564177b9752b13fd046b8a71052a6203d08080c2d748b7c366a56333168fed684a5d22a35abdbd0ccb65daa03f5e3cc07a89d73d18da38ceb0c1bdceb8afc49dd60b8d2ca6947ce6ce0d655f77b57e2aed0da33feab7f3434cb57df7d8c2e72d957898e4ea007953187763dd870a22c3acf25c3cfc35eab25be8441e7588bf255c693608530856515d4e047df9c9a5cd5a8481cc04d78b347d6f314714516f5fdbb65e874c2bc0128d82f031d35e175cb440fb6fda64c7a90f2c7493c9cfd6d1858dc5c145df55b5948242db084efe95141645802eb1cec1d9cc9e5bb3791eeae916be212f25e6ca5134739f12c13536d0118bbac49495ea6b77a24519bd5fdcb1c8a5a4a30280b34d1900dd119ec039a5c7aba8d17b3219b74635140d8cf76871c793784a8a981258f72231aa75bdc9ad1d6339608dee474a3856aca9bc2ef131640ec7f09d4a737431c552a876755801dd1c3351a4c166b94b201fa2523ad6aba700c9b27a400b540d7dafc8cb5c046406ecdb26a67da469057e21392df1824da6997ce6b1be281bc033b7a5ef85fa5f8b57eea501936bee184fdf7772ebb78fee253e97f9215ccb28afb41dea041f9853333681cc00ef2a85cddbc546d0f544909a1a7a4c4beb46b06c72657da640544837b343d2139c944adbb6f6303b3978efab19ba0b549941fd51c64ddd352fdfef6c458e7449b4cdc2dfa75de15e4e2c78bfb21382d522684b11c786786d39b8e74ff0884f3d20a39ab999fbe3a8a630e7af7e62d1eee2e9aaf1348723a5f6a9217b174f0c323a14f4f14890d41f2d7e2ddf523116763dc53a0b32560c6cfa8c5bdb1cfdb030e307da1838cf7ef4cc997897925f64a2c5d144bd264904550a572c6ad711693ea7b1b841943eb533a66186aa4698e4b2490943a5bd8075ee6b0c24e4b1571f7f6ee9d98eec676a8d5c05ecb7fe8322e862785478c794f69cd9c5322d0ff68b3d6e124820887705189a9831381e37fa1f18678e6254e6e80a7ce8a1cd965065fea6d48acfe2fb25a302a98b518abb992371eb99c7d47f9cfe96bef9bbaff1453fd20973446518bd3d11e53d76b8714e87d737bdf3b306753e138f27e79916da2ce54edcdedb975d49f2c77da894d0dd04d1a3e675c2e7f978bdbd7668de303192c7af8706a5ada50e8f0d6843aa3c36d7836e88930409c60bf03e0ae8a3e7c601e2b4678024efb5e91dc231007e1f7e637efd08b729d790b899944421680d917d590b0659cbb3406dc7d1eaa5b461aa7c979ed3eaeb09fb7fe1c4c5c00bd3862bfc8160f04f7aae671fcf1aecd54ea192f4a0ae2c3762ddc38e3a212008a24488a2ae98731a19cfcc4881c5fbe08a3696927b8ff7e853d3097ca1840c5fc4b49e881de5af9c82d76b5723821db4480e8d1a66084274d2811f038d017af68c4f0412893a783f476a538d84e43853a913a20afbb927614f1ddcd5641973f784713eb25d0498b9f9d66a82a4294262e661c67295bb4f43593d9d9e3bff30eb67e479981c7e9c6bf32333f0ac688f22e984cad4c4004e5382e3d4ed7e79add11f86eaa4464e2ff0e568153768fdbcfb26bce8692dc62f069c5cefa204122289ce5c9e0618b6a1b20d7f37e88044c38339fc746703fd3ae1ee583717e94d01f4c194e4908b901c7ac02829fe0ea318f12249c4f1378c92465ce7a8f37bab36e9857f859aceb8e7fbb557aa5c07d2b37f6d440a59e76bbfbd1f6fd92375eb9d0d4ac9de484abc23369e867a6b024bcaa54376fea8ccc3a32f127042777b083474d3c77d77f3f5f4a9df5fde25ef45fffd1874b17c6701010d35e44419c0b2f42edee781b4531b419e6767b775079d38aaf2a48aa540c0597ea20352532471c093c7e4079bfd649d4a69fd3f47298c89eb848b566532e4531b07f1baf2ea681880682957d44709666610bff4ba2bf4321e1fa65d21623a013566247ba45f4f97d2d652a237460ba1c663e64fb61fada7f366d22d41ed8e7889ac853cf45ee822f3b5ccc324ef0aa2e886fde7447f2cf83d2b991852181e952541cb196708f747ffb8232b7959b7b182fc46046b257c295667e8fd82a386e2be8c6df13ea1283ac111eb9d1660403672fe8c37ab0e1aa0feb7c6607c1c34a82d321e673f31c2579e2c6f737f08bd131ede7990129167dd831666bc1d26202c5787a2ee1847104ea242a1166015da1c1bdc022dc5dfbc927e657579fc444a04947270e358f913fdfc5f902da88bf05cdb560d5a76d5412508a154ff6ea33fd970cb8800cd49a383153b899ddf9faa239b865b7f3ed622bbc1930b33528d6e6bb583ed9559d49eecb7905e59bb26fbf3fb0cd0a61fcea1b17e339dc537f3954ffb0401858bb650980ed8e06b4ac089f96baddf76e95dee0b0b7880a088253d5d25cb5beb65be2dfd17c3163e5ea1480f7b8d56038165c5f26dbca08d593f88bd4edfebe8097e4805f7b206ef16394439ef3dc355718265ac74bd8553a1139a2125ca36a420f9100f61939c57eb0d38af68565b1c76e249b479e8f060aa0c9b046f05876d0cbdc85162029b018ad60d1ce1ae31fff5eafb8fbce64dfafdccd4983b8ab626a2b07cc9dc4843bdc4b96881a31aecdce6a4c4b940735d38fa6b2e206e4c9885d67e09b6f9d01fcbf26398e9b8d0a9adf01248a19c8aed0504e1a1b8597fca753ff0ca519aa915bf876ece0dd21c3b629df60c49de5b1a03997b7f7996fe5e23cb918e3579623b38c29b90e0b8f84449af173f3c1d992e459d2e14a4015d67d16151766e7434cf54e7928ba46ee5bf16165af04b1dbe2137a098a27e759f09fb62d1fd98c9c05ed8d464e14f21342fa207b6253b6ccae048dca4b2cee5747ab8b45aa458614181a942acb683a823b27a234cf14d3bfaabee6f09a25ef0346fc2256d29496c9d1369b961bd1e00b509f29389e71eb94b001ea411b8cba84f9f70a01e25bca1a784635b3e034697c8c16234bd507b81a2a9c0daf96195b3c1822b0ea9fc62e5b0e6dd41b77f4cfee8ddaa163e5b8ccc608c3cf21390ef705bbec2f40061ebe43da04d1adffebc945bac9054fc8349b60f231204d173637f4300945cb0f308a96f89c28e89d75bcfa459d5f90db797d7cd62a9dc027501ab41f81193539b5577a6370de54852af2b5ddda6a8840d37027f6822e256fe40275b7b18eab547a8dc7c17dc5e9b8c9d8a454629c904827bcc668595cb6ab4dc5423baba58584f33134c362a08659e1e7cc5eb6416a266b0d1e1e109cf7f09dc4e030e1739504a09115139098fb8191eeb4737f028ea6097050d2a6ca8421f0bfdec9e1371db8fdfd0c03a1658e94aa7096ca411f205ca997a26fa2676f55f2910cd6ce25b44cdb20e1df995cd12a8caeb0eddf90e575d754ad51190eaddbbee518556ea68df90be8e68611712ff2f729da25ab4adef901dd231389e19ef7839474a814f40d1c65f92f9cde7cb6c53167e6c20e638206a347c07a8832ebdaa46a86829305302c3b067f699540c74eb2dd155eee824dcf438df64ac3bef8600ab2ef6d21d9772d5a8e1173fef91b163d05d62be180ff7ff2604f67fb157de15229ce96911ba5839fcde079f48315c4a6cd4986d69d298946dcc4191d3591c0aa07ce4974cb68c11dae4a136c99c5a2378c20e192572299c68c73389d9a232368ebdf54399c12582295864e5ffd18a9241402c8ea5ca9616fba9b10817ba0bb8301c8424596c975e2bdafcd03dd32d79084cc347902f4c9208adba0c699e707199fe5bd1026638a1c9125e3fcbf2a8fbbba45b78e9734ffe4a098e870628cbcbd7c13c12fbd3d2ac31c4579493dd1c350f0209acb50d914d47023bb9a7e02d0106d800982e8f34834fe562e5ea3aad09a82e8513406faf8e9011f4338b689d635c899018e3e985c7d97680b1c71bed439506db8627191abc8bb7042943c10414e2145df71ac903ffa8958db90e3b2f3ae5c7f6be621e71ef10ca40b07b4aa65ef6adcda901bc6dee0b14034f761cabcb35fd598a3fd1c3c4145a4cc4191f9a9a4bd43d2704dab9d178e4df0fe7752ecfc0d4031e0c9e44a04e90defab1698566e665fbe7e7fd1ac92947dfdb117c582934f607e83bfcd247300dbc069fbddc09c80b5bda81e17a55a459e6c39c22b88e5ce1354cfaedc7d0a7d63dcbe80e12b3f9a7426fe9c4022ecf0a44a4dff07372d443654d04019d6c2758bf7e0b893d4646dc6feb08fada445c65fcd087ba89f7ed15b6f9a685ecaace24f6f3cfc7f59c5b2e846f7b20ff6d1df8730b458b970f00fee445c5d379a2990baf1fcbb693278adf882ac7f9df7a4e8585ebf5af141b924e3443303b33387caf3e10e7cbe575e24ef1261265e22257066495bdef36d42f4b9cb6cdddb1a6ce6fc13f3efd1d57fa2cd07721b2a66ca52b993c55ca826bf7ae925636fbd9dfd56f649167c68b516caa3e15d964d7417f562f262b0db3f23b7ed364b97f9287966bd9b3342d87f8a6198d549ec70dad2cd14385a2fae155cbd625804caa7de21dd7e2c065ce58464c5224cf0d1f6ff0280bbb3c9d72a053f42636e83980dafdd780125b5feaa8a38e5968bfb99c60c9472329fc51380345920924ff1a548de3f21672666ff82b23f548e7b960de27b6bc2d63c2e677c3b141b7a76de2ca1e4977ac7f793411566ed03d10df189780aa67f1a042fce8eca229938c3e385946277c8a3f2dcc22b11af393e662d265be821dde95284b95d58ea367613296c1f472344c3aeffd5a53925dc064809f52a48b1c4f21885b2c40b25ed5b2f8903c6f3223a955dcfd59df657f54a5ad1f39fb8275632872cc960070186268a0334b54e80bbf06aa71d26ba9a00828d421276e9d9b9aba50d0e0f9bdf600a3cd25628b210779955ca53c942c2909fd2a5b067cf6c7fde7ca36949d191a4f71316d52c0be8106066da523d887b8ef0d1de6534a0445b75c23d8b814dd999641a3bb8ce490d70329c9b92e42cb51eee4a5e094aa313dd9da0e88278688052b94e1a628aece8cf9f94cd0f82bbc5984269132e5f8ed54bb515f69a7832bb2368a15e1b604a702266fabcc392e327f987e9438129da28c795ac6e8561a9f30a98d8de8bf0f8da714d264ef413231bc28d7dd52962f116ba7587f7b946a54904105295318f53e96cb6eec3fee53ca92e6007af170b6beb7a9954b8b117472b4b497d5e953717732b374103eb20ce2be0a897a06156dabef6f55c49aa7a69bf53cbff6b1d3cd3c0c5ddaf94ded37f3e9c777c580ccce314da0b5ea2728a78bdb", "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"}) 10:31:21 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f43600000000000000"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) 10:31:21 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f43600000000000000"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "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", "2535e652652b8e4e90c1e509c358644a9645934014b02d327b581514068c53c79d78dbe16f1e6b90515fb1baf627eae06ac83a11611a89cbc39a830ea2766f31505e77c80920993fdce16dd3db29faa2001619d7da483696be704b1fe38f6c60110ce3d06e6617b04a124a12841af544b241804bca2b23c0e4d07ec13ca49899e9c5f690b8ffdfcabe137a0fe81762ee6c0f76cbba0bd6b8dcb2f373e86496baa771dfa6beeb218c90d1033a91a1211ec0d4c25c2f360e6bd42c917d5e1e2438d337973248f6d6626d3d2c68059b166a3aa8d58f55c7dbbfa51440b04a203c1f3cfa88a2f8295f521fee39045b59bd5e49565ee98b2ee635258e9f95c99cbf0801f0fef2dba37cb344078d27e081697e6d20b75bb58e9e5ae59032fe6c2cf99895ea2e9fff1b5b9e04e702b51d2e6075ee0b16777b2a6f3b714b1da7ba9af41043f6ea418af7772e0857c7ac179fa0ca37cd543ec5f0ebd0d47afa88234c5a67f5c1d49adee0b5dbb997f8040ef1ad53b35b112888ca8aef695eefe4a8c6beb0d196d2574ef4f4ddee279bcfaf2049782e94f73469920d68f2459c7f3a7df809161bde02c5b457a6b0076f4cf70ff5c89fa05e34620f4a8b3414fcb5701cb602d4c47bc5829ee2dba5025f1116dcb35c4b71d924aca3bdbeb888dc5d119328ff2a4a357da3282bca00d745fdd821fd8fb56b0bf34950a9dae78942ca46618311763e94f5b5fa1a25247859317bc916b078b7aeb69b70ee08c5b97942db785652d2df98ea0e299edd0cf173f108f5a6ffae03961d0e54e0f646ab82f8f2dc251148bc4822d45623bd29a93e066e315f75dc122838e240e29f57b0e3a26876d3c6001d1fba6a533f7b91b984bee18796f0ad8901e94a0b123134cfabfe9062b84bcb8f3d8147f35bdc4f1a19e50b93a729790ba83472d8bfb77871353d461e529ad6a65d005403d2e9495f1878a83520f91f2ff2b94bfc4a1517fc2652dc646f07d58371cc9a7ac0949d7f2681d066616944541046f0a65fc7ab23c39bb5ae769d22420191238b6d7cd23298c4747481950fa016f0887ae0077df34b2e616edca5009512c9de6bdc3aabeac4d46b677f44e5399ac42bc365ef51b5f6b750a002eae710eaf6ad72d25c46f2217fddf2e391faa76eeeb1e9e944f14da1bd114514e3f936a58e466da7ffe47fafde52af3a6e67a7a6d451ba8b494bc93e08a32d3a6165db0403db5ff426a6e5d7c324d1f541e7b779d54909ae240cc3b8f0eada202cdbdb280104a6aa17183685c82df1d8a757e106b8abb62fcc276cc1d37f00a4ea1f644d322bea07c80f3f1e4cdde7e989672be423f03fd3a66444e83bc4039d15bbf4cad09900d704ad0f0135438ab72363e6abf997256929f38d63cf478e1732ff16ac5f3ae5834eee46f373bcff26a43219766a2431f45fc16fb1d2416d7d98b0eda3dba4e020910fec40423d57367b455fc975d929f6104ea8a035f1226a540961fe1d630e9e0af2b1c70c9304fc4d5bc03496996a308be4224f331206f10ddb2f251216ddb4ea1c374b79de0fd4ca4e0529efdef0478e89274af640d5c0b1acfc9c5bce6be0afc1a4fbbad2b9deb2191391a073ca68b9e01f27b33c7b24c7217fa287ffe7e6bb157fb4c1e690dace2f71f93656e49cf0c29a2f77a4520220639f04da0ecf74597565733005df7680fc489d30730d895e78f3e286c2b1ade9a787e64f762fbb6460e802c9c35bf44a9fbcdd15dcac310bd4580e9298fcd583b2a068f3edf201b8430c726f63eeb7913ea74a1e37fa9dfbc023843a910e99fd4a8f1acb6df61b3dbfdae75a0861669dc8a3a7eed7eff6388e363e1ca6ad5f0bffb62c64ef99be948f7529719b528caea919a8efc4c2d5492eb64c7cba09a11f8f5d52582207e703bd7ce7c3a8949b00aef120ad8cf6e531de6765ace8bbb4d45f61cf075abb2af2794dfbb65ec019a6ea47c0c81e345a3265b85b4c5ad4a4c5c3040a3f134626aeac019f04a61f0c1e6f906d5371e82cd708b73cc606fa73d304d5003fa3fde4817072798127dfc06ac7097355959a18bf22b46e165e3f40db5c014b798f6734304350b70658b8f394a1205c2f582554c72818d9eca4e487cf26c7bee2bb86c44a4259213b8370a32c64b95914aa1dbe282504e0f26f07d9d7f58bda76083ec2ad3bde6f62217a9801292fb20a0b409d7f81a816ac5da5772291937341efaff3a3478f6b82a65dd1c2f2aab0c38958c2b121f3457000b2848cc55678e2d44710c4902229097ce1aed33805c876891767a9726f4f2931262d4cee51cdc48dad88f41e1ea9a3041f37fa3329d6a83151cc799b1a82ecd9c8142207e86524d6bd3f4de32cc4ef505721ff86f79aa4aa44d10bd1fb35b20b972de84e94a2833125d2480e54311bd6dac5c2d92ec4df30eb8b6da8bb69b956e8906d66636442c1754ada641e6f40cf3cf25aefeda2bf43f721144f6a04f3817c7f141343a85b173ee16a47ddd9bf7c7eb2b7411ffe14c7577786e571d1c58d869107cc699468e31e76348e9835e6d1e688d61f93bb4e84929d3ba01e653213cf633f880f7f293ac6a5fd688371da0752ef16de6fa850ed21bbc7fb5522047e7ce084625a9e9db58b1105be9462a85fb843c3341074afdd7143d0e7155cbb1715def86353d1356da55427845ac9578a98c3f6ef9540a5b383e5162a5c3b5050632a36b1608dc642efe55cefc48b1e3f6577be3bafd729e6ac076e032fa97ef9f277b05cd950bdab91478f88b8bfdd47a798dbda6e422f7a1757b0af740019d68aaf2424a9361e9b5ade05bba471c7796f8e7ab5272c83771ca7b092c06aca147301b55efa2db6056aa6cd16ef6faa128e9befa4819719434316ea2183a3e0baf051b78c415fa211abd8e8f95ef2f8a54ef0591140bf2902fcde99e9fdae932512c1e4d86b0c4bb6b9c2e08c5724bdea06630460e43ed74f8e8ecd16426f15be8f2216de9d5163d7b16bfe211c91a57422a9453dbc6e48ba74b4360a9e86d2af388f394e0e877deea01f7eaf56777e35b0170728155ddc760a24d6cf9a0627fd02ba558963d62f55a7272da596dfe1ae22261de06123171f04a0075034348cd0c4f13d14b392ac70f77098902c392560a7c6b0b62550dad4133abafed7e1f00475f3862da833d0dd020b75ce591705390d84e24dfb51676f67d4791f3d914b8f8e9196631a4c0240b6698adc57afba22357388adf99ed7fad77577c94ca17b414077e9834704c83f168b253e539f79ba7fb32be551218f8d9d1981a4621849e135bb57bd7583809f4dd742b7583d7ecf186db1d27a2a4f42d8cd124b904aa6396a1b77480840551630f8d5aaf001ec9371466335dcb119bb4e38506ff2e21e2c062976afd124516731a843cf408458b8370eafcc0a5d0b0f8bdcbf9c14898b4d99f09f17a73f98a21c088d5a40740e79ec1999c431b3c450106f2283c89a5d5e8fa688777ffed8a3310a5e9bb2dc93441487254d8963701eb4c857adede7513b3fa02903875abd7f293abe15c72f6c88c76be31b6d4ee653c21936d20aaa686964433642dbc1945655c4c33dab5bd0b0064dcd463b4332af47246cba86d6a9ac99e6d061feb64a684266fd2f8829e922d91b5158c6777fdf97c63b993f6d750469a4d8d41b6fbcea6ca3d426162992b870b0717fe9f9fa9d46fd6902212351f2d1cecbabff3130bae9a5e401bb3a5d35d45abff8df2284982d1a1a594ed0bcdde528d3a5947ec3c4933732af62eb876d1c5f3ab76efb264e45ca91407dd3aa6b7a1be61bd95513c4d16c6816c1d17391b19e5084557f8e2631e91fcfca56339d9c03f73616948a76bc0e903f146e0f8007d4e344e5c7b94d576815fd22858bccd44ed534d50651113d3377ae256b1d015246c83f6063d1c8a40009591bef2c6e431df546f29da38e7befbfcdb2ec588a8f81249766f2e098f75c14f772372c94a2446280d9e7b42a20dfb599f3ab365172499df5b2d88b5da3fc64d511792e5e166049fa8b965482eb0d9595b044a683894cf2d32682df24bee5c212b761b9204a06148bcbeb39b006d1dac1b2dc458766597bc44ad62b072f606f30a3367c9dacbedd07fda7619a2452586df8c88b3c91110e24c7230c60de15db94c7abccbd29741cb03aef9b74258782ea7dfca2c2d82ced61462898eb92e3b7f861680bdeac29e659c5ab95be1f069410d1b6eaa4e40038d4e82f4fd9ae0c7e8222329a15aa7e84b569372eebf59a3755817b3ec2db831be091e115ddedfcd08b38b0b9b7f1f25d707ef906edd1315a4acd29691987dce126f9b6edb3fd9d738768104ae73018f8a3963f9511a356f8c7d4067b411cc891ebe4490668f2788da28045e675f19c4c24506f58b59861122c047d02f6cafa7cb64872ea179b22df9f3f18ad0ac7bf8fce94bad934e882226d6d8812c06e174d4fcefe9b81d5738c60975b89de6e36bb7a7b943e6d6d2d90f85a8c5956b9fe16a37f7d87f96060eb97da6eccf4e169e52994830d7803b23bf1be59643c6d9af405aa348ce1718f8aa30dcfee7491a3d8ed9276e2819177e57233bf9de0386c21c57b4943c2d8395fe2e18d94cfccb8a6cc53abf4e310e1bce06da99fb774e535f2b1908673b687dab5282ce7b8dec29ff435a5a5e7495513915dab416b554277b3ef0d1f37d7f10024a101c7051c7f13f8bb842ca9c28ddd87f5779052bc145dde6b508ced79b8531a4d5fd24f8ff1fc66f1365a439b6926b20e9e4639bcbadbad882238fcb5a2ba2d1b31ec4513bf406e53eb0065065af0918b97a33d8bec56f5c07553d090fd7a95a59a1db404d09826378328bb618a0c800ccdacfc280b2c6d5207f2e16ad203a27188eb70b602f8a23ad3ff7306f6f59cdc80f25641d33c0cac73a7cc5ec6c4f353777aae438125bff1e4e593b34c503c80525654ce0d6822c3be7e12e200a788a9af5d4a9f16741f6ddde3681431a758ab6cc926e0dadc6df05f0cd2f9ec76838c3967c82b91966fe24c04abfb387258b1cbefbfe5cc23e51dcd9138ca004d74fa688aee943c9c3c5e85cb3f3e6b01d1db8ba5ab055453fb270b5ddbb64010ffba8f8c3ad040cac6169a3b8288b10dd5968b22add3aad18e47071347406cf45e62c855382c1a2b5aa68f0f0a2d10ec8857854a7422f5e53a24419ffd0279e158a1d57fd355848fed355687f62688c54e9b20db397c95bb7c6f3deb1b33ee2d8dc5f3429e9875307dddabbc8b437cfe071f747eb56a32b9401424ea9b96e69634b5898bb916d0a1d1c785a8904e8134327b6537e9c590d1f4be8c66bb063fade7980931c58b8987e3b7022cec4072f8011502051648b5baf39cf5d644c800c881c67861ab8fc60471f0fed8108534dd34ddf076d4631f9640a46f2e763a85dc7f27a03f8063bdb9b65c004f22afb07380349749c25bb5021885a247a4799e4ee25f705b7264ab21a6a61bef6dbc72217da95946011f05337b569c0ef20a626635017d43006f739f0733edef5c9c53fd510aa433ab7ba3cd1a67c6c6e7fb2e348d891f8a66f335eda1bf50eb618ae001d7cf32283be7b263fb3dc14401ae79a312ad6e706b2b79fcadb2ca8187845aa13b2b0b2cfe597422b99f16a7722dfeaa1a380cba9274aba00d2c1489f1f5867721cc58c617a56dc662471a55398dc816d9cd991a3bb95db60877e748c74613c0b9b4450559d0b8f7daeaaae496be43146a8a0073bc194158f4c69c69dc3abd9ca402b9cea27eccd2b0e598cb36d64a2730ac589fb95588df"}) 10:31:21 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:21 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f43600000000000000"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) 10:31:22 executing program 5: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f4360000000000000000"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) 10:31:22 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:22 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f4360000000000000000"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "245546e1b57a01fc0b7a2bf349f3ba806c772a2b436327706a3117050605b942ca899b86cc056ef712f787b24f5b94917cce765f2ddb44d30616bc32318a3d6cf1d1097dcfb571e984efb3856f3aa6810394d9bec693630611a624fd2cead37c13b942da855781b9f2267390881810c0c831d0f2991c3671734341bb7d2b15ec06be5ca6e65f89faa61faab4883e69654b73877afd3a392eeeb89dae8b149dbb00dafa792211c194a0bccbf549d196ab3f82d5d6b3b038787dd8f980d42f18f74beb947371dee8db5a1f0b71e6249ca040fdd2b4d66a83c3a9ed828d3447dfb659731a28ed3be3da94d339dca3cb80248428f229bc11f40555866c4524ce0271ab34bece9d19f5a7ae2659bd408c7ddf9a25415fafdadb36864be3ac3aa0f04c9f981dd209e5f641e7d3baff72b0d0f3abff731618ff41afb483d7c2a8a1029bfa255e2aa96fb580c1eef7b5e84f7df0d2dba962afcb9a2a770e36bf93999465e6737dd57e564177b9752b13fd046b8a71052a6203d08080c2d748b7c366a56333168fed684a5d22a35abdbd0ccb65daa03f5e3cc07a89d73d18da38ceb0c1bdceb8afc49dd60b8d2ca6947ce6ce0d655f77b57e2aed0da33feab7f3434cb57df7d8c2e72d957898e4ea007953187763dd870a22c3acf25c3cfc35eab25be8441e7588bf255c693608530856515d4e047df9c9a5cd5a8481cc04d78b347d6f314714516f5fdbb65e874c2bc0128d82f031d35e175cb440fb6fda64c7a90f2c7493c9cfd6d1858dc5c145df55b5948242db084efe95141645802eb1cec1d9cc9e5bb3791eeae916be212f25e6ca5134739f12c13536d0118bbac49495ea6b77a24519bd5fdcb1c8a5a4a30280b34d1900dd119ec039a5c7aba8d17b3219b74635140d8cf76871c793784a8a981258f72231aa75bdc9ad1d6339608dee474a3856aca9bc2ef131640ec7f09d4a737431c552a876755801dd1c3351a4c166b94b201fa2523ad6aba700c9b27a400b540d7dafc8cb5c046406ecdb26a67da469057e21392df1824da6997ce6b1be281bc033b7a5ef85fa5f8b57eea501936bee184fdf7772ebb78fee253e97f9215ccb28afb41dea041f9853333681cc00ef2a85cddbc546d0f544909a1a7a4c4beb46b06c72657da640544837b343d2139c944adbb6f6303b3978efab19ba0b549941fd51c64ddd352fdfef6c458e7449b4cdc2dfa75de15e4e2c78bfb21382d522684b11c786786d39b8e74ff0884f3d20a39ab999fbe3a8a630e7af7e62d1eee2e9aaf1348723a5f6a9217b174f0c323a14f4f14890d41f2d7e2ddf523116763dc53a0b32560c6cfa8c5bdb1cfdb030e307da1838cf7ef4cc997897925f64a2c5d144bd264904550a572c6ad711693ea7b1b841943eb533a66186aa4698e4b2490943a5bd8075ee6b0c24e4b1571f7f6ee9d98eec676a8d5c05ecb7fe8322e862785478c794f69cd9c5322d0ff68b3d6e124820887705189a9831381e37fa1f18678e6254e6e80a7ce8a1cd965065fea6d48acfe2fb25a302a98b518abb992371eb99c7d47f9cfe96bef9bbaff1453fd20973446518bd3d11e53d76b8714e87d737bdf3b306753e138f27e79916da2ce54edcdedb975d49f2c77da894d0dd04d1a3e675c2e7f978bdbd7668de303192c7af8706a5ada50e8f0d6843aa3c36d7836e88930409c60bf03e0ae8a3e7c601e2b4678024efb5e91dc231007e1f7e637efd08b729d790b899944421680d917d590b0659cbb3406dc7d1eaa5b461aa7c979ed3eaeb09fb7fe1c4c5c00bd3862bfc8160f04f7aae671fcf1aecd54ea192f4a0ae2c3762ddc38e3a212008a24488a2ae98731a19cfcc4881c5fbe08a3696927b8ff7e853d3097ca1840c5fc4b49e881de5af9c82d76b5723821db4480e8d1a66084274d2811f038d017af68c4f0412893a783f476a538d84e43853a913a20afbb927614f1ddcd5641973f784713eb25d0498b9f9d66a82a4294262e661c67295bb4f43593d9d9e3bff30eb67e479981c7e9c6bf32333f0ac688f22e984cad4c4004e5382e3d4ed7e79add11f86eaa4464e2ff0e568153768fdbcfb26bce8692dc62f069c5cefa204122289ce5c9e0618b6a1b20d7f37e88044c38339fc746703fd3ae1ee583717e94d01f4c194e4908b901c7ac02829fe0ea318f12249c4f1378c92465ce7a8f37bab36e9857f859aceb8e7fbb557aa5c07d2b37f6d440a59e76bbfbd1f6fd92375eb9d0d4ac9de484abc23369e867a6b024bcaa54376fea8ccc3a32f127042777b083474d3c77d77f3f5f4a9df5fde25ef45fffd1874b17c6701010d35e44419c0b2f42edee781b4531b419e6767b775079d38aaf2a48aa540c0597ea20352532471c093c7e4079bfd649d4a69fd3f47298c89eb848b566532e4531b07f1baf2ea681880682957d44709666610bff4ba2bf4321e1fa65d21623a013566247ba45f4f97d2d652a237460ba1c663e64fb61fada7f366d22d41ed8e7889ac853cf45ee822f3b5ccc324ef0aa2e886fde7447f2cf83d2b991852181e952541cb196708f747ffb8232b7959b7b182fc46046b257c295667e8fd82a386e2be8c6df13ea1283ac111eb9d1660403672fe8c37ab0e1aa0feb7c6607c1c34a82d321e673f31c2579e2c6f737f08bd131ede7990129167dd831666bc1d26202c5787a2ee1847104ea242a1166015da1c1bdc022dc5dfbc927e657579fc444a04947270e358f913fdfc5f902da88bf05cdb560d5a76d5412508a154ff6ea33fd970cb8800cd49a383153b899ddf9faa239b865b7f3ed622bbc1930b33528d6e6bb583ed9559d49eecb7905e59bb26fbf3fb0cd0a61fcea1b17e339dc537f3954ffb0401858bb650980ed8e06b4ac089f96baddf76e95dee0b0b7880a088253d5d25cb5beb65be2dfd17c3163e5ea1480f7b8d56038165c5f26dbca08d593f88bd4edfebe8097e4805f7b206ef16394439ef3dc355718265ac74bd8553a1139a2125ca36a420f9100f61939c57eb0d38af68565b1c76e249b479e8f060aa0c9b046f05876d0cbdc85162029b018ad60d1ce1ae31fff5eafb8fbce64dfafdccd4983b8ab626a2b07cc9dc4843bdc4b96881a31aecdce6a4c4b940735d38fa6b2e206e4c9885d67e09b6f9d01fcbf26398e9b8d0a9adf01248a19c8aed0504e1a1b8597fca753ff0ca519aa915bf876ece0dd21c3b629df60c49de5b1a03997b7f7996fe5e23cb918e3579623b38c29b90e0b8f84449af173f3c1d992e459d2e14a4015d67d16151766e7434cf54e7928ba46ee5bf16165af04b1dbe2137a098a27e759f09fb62d1fd98c9c05ed8d464e14f21342fa207b6253b6ccae048dca4b2cee5747ab8b45aa458614181a942acb683a823b27a234cf14d3bfaabee6f09a25ef0346fc2256d29496c9d1369b961bd1e00b509f29389e71eb94b001ea411b8cba84f9f70a01e25bca1a784635b3e034697c8c16234bd507b81a2a9c0daf96195b3c1822b0ea9fc62e5b0e6dd41b77f4cfee8ddaa163e5b8ccc608c3cf21390ef705bbec2f40061ebe43da04d1adffebc945bac9054fc8349b60f231204d173637f4300945cb0f308a96f89c28e89d75bcfa459d5f90db797d7cd62a9dc027501ab41f81193539b5577a6370de54852af2b5ddda6a8840d37027f6822e256fe40275b7b18eab547a8dc7c17dc5e9b8c9d8a454629c904827bcc668595cb6ab4dc5423baba58584f33134c362a08659e1e7cc5eb6416a266b0d1e1e109cf7f09dc4e030e1739504a09115139098fb8191eeb4737f028ea6097050d2a6ca8421f0bfdec9e1371db8fdfd0c03a1658e94aa7096ca411f205ca997a26fa2676f55f2910cd6ce25b44cdb20e1df995cd12a8caeb0eddf90e575d754ad51190eaddbbee518556ea68df90be8e68611712ff2f729da25ab4adef901dd231389e19ef7839474a814f40d1c65f92f9cde7cb6c53167e6c20e638206a347c07a8832ebdaa46a86829305302c3b067f699540c74eb2dd155eee824dcf438df64ac3bef8600ab2ef6d21d9772d5a8e1173fef91b163d05d62be180ff7ff2604f67fb157de15229ce96911ba5839fcde079f48315c4a6cd4986d69d298946dcc4191d3591c0aa07ce4974cb68c11dae4a136c99c5a2378c20e192572299c68c73389d9a232368ebdf54399c12582295864e5ffd18a9241402c8ea5ca9616fba9b10817ba0bb8301c8424596c975e2bdafcd03dd32d79084cc347902f4c9208adba0c699e707199fe5bd1026638a1c9125e3fcbf2a8fbbba45b78e9734ffe4a098e870628cbcbd7c13c12fbd3d2ac31c4579493dd1c350f0209acb50d914d47023bb9a7e02d0106d800982e8f34834fe562e5ea3aad09a82e8513406faf8e9011f4338b689d635c899018e3e985c7d97680b1c71bed439506db8627191abc8bb7042943c10414e2145df71ac903ffa8958db90e3b2f3ae5c7f6be621e71ef10ca40b07b4aa65ef6adcda901bc6dee0b14034f761cabcb35fd598a3fd1c3c4145a4cc4191f9a9a4bd43d2704dab9d178e4df0fe7752ecfc0d4031e0c9e44a04e90defab1698566e665fbe7e7fd1ac92947dfdb117c582934f607e83bfcd247300dbc069fbddc09c80b5bda81e17a55a459e6c39c22b88e5ce1354cfaedc7d0a7d63dcbe80e12b3f9a7426fe9c4022ecf0a44a4dff07372d443654d04019d6c2758bf7e0b893d4646dc6feb08fada445c65fcd087ba89f7ed15b6f9a685ecaace24f6f3cfc7f59c5b2e846f7b20ff6d1df8730b458b970f00fee445c5d379a2990baf1fcbb693278adf882ac7f9df7a4e8585ebf5af141b924e3443303b33387caf3e10e7cbe575e24ef1261265e22257066495bdef36d42f4b9cb6cdddb1a6ce6fc13f3efd1d57fa2cd07721b2a66ca52b993c55ca826bf7ae925636fbd9dfd56f649167c68b516caa3e15d964d7417f562f262b0db3f23b7ed364b97f9287966bd9b3342d87f8a6198d549ec70dad2cd14385a2fae155cbd625804caa7de21dd7e2c065ce58464c5224cf0d1f6ff0280bbb3c9d72a053f42636e83980dafdd780125b5feaa8a38e5968bfb99c60c9472329fc51380345920924ff1a548de3f21672666ff82b23f548e7b960de27b6bc2d63c2e677c3b141b7a76de2ca1e4977ac7f793411566ed03d10df189780aa67f1a042fce8eca229938c3e385946277c8a3f2dcc22b11af393e662d265be821dde95284b95d58ea367613296c1f472344c3aeffd5a53925dc064809f52a48b1c4f21885b2c40b25ed5b2f8903c6f3223a955dcfd59df657f54a5ad1f39fb8275632872cc960070186268a0334b54e80bbf06aa71d26ba9a00828d421276e9d9b9aba50d0e0f9bdf600a3cd25628b210779955ca53c942c2909fd2a5b067cf6c7fde7ca36949d191a4f71316d52c0be8106066da523d887b8ef0d1de6534a0445b75c23d8b814dd999641a3bb8ce490d70329c9b92e42cb51eee4a5e094aa313dd9da0e88278688052b94e1a628aece8cf9f94cd0f82bbc5984269132e5f8ed54bb515f69a7832bb2368a15e1b604a702266fabcc392e327f987e9438129da28c795ac6e8561a9f30a98d8de8bf0f8da714d264ef413231bc28d7dd52962f116ba7587f7b946a54904105295318f53e96cb6eec3fee53ca92e6007af170b6beb7a9954b8b117472b4b497d5e953717732b374103eb20ce2be0a897a06156dabef6f55c49aa7a69bf53cbff6b1d3cd3c0c5ddaf94ded37f3e9c777c580ccce314da0b5ea2728a78bdb", "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"}) 10:31:22 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:22 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f4360000000000000000"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) 10:31:23 executing program 5: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:23 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f436000000000000000001"]) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) 10:31:23 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f436000000000000000001"]) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) 10:31:23 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f436000000000000000001"]) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000240)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) 10:31:23 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:23 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f436000000000000000001"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, 0x0) 10:31:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f436000000000000000001"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, 0x0) 10:31:24 executing program 5: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:24 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f436000000000000000001"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, 0x0) 10:31:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000000d000000f9ff0000000000000000f436000000000000000001"]) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, 0x0) 10:31:24 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:24 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:24 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:24 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 5: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 1: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:25 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 5: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {0x0, 0x23000000}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:31:26 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:26 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:27 executing program 5: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:27 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:27 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:27 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:27 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:27 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:27 executing program 1: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:28 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 1: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 4: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:28 executing program 1: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:28 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:28 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:29 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:29 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:29 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:29 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:29 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:29 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:31:29 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:29 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:29 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:31:29 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:30 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:30 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:30 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:30 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:31:30 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:30 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:30 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:30 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:31 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:31 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:31 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:31 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:31 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:31 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:31 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:31 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:31 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:31 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:31 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:32 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:32 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:32 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:32 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:32 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:32 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:32 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:32 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:33 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:33 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, 0x0, 0x0) 10:31:33 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:33 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:33 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, 0x0, 0x0) 10:31:33 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:33 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, 0x0, 0x0) 10:31:33 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:33 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:33 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) 10:31:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:34 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) 10:31:34 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:34 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) 10:31:34 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:34 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:34 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:34 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:34 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:34 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:34 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:35 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:35 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:35 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:35 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:35 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:35 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:35 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:35 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:35 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:35 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:35 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:35 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:36 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:36 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:36 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:36 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:36 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:36 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:36 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:36 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:36 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:36 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, 0x0, 0x0) 10:31:36 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:36 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, 0x0, 0x0) 10:31:37 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, 0x0, 0x0) 10:31:37 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) 10:31:37 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) 10:31:37 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) 10:31:37 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:37 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:37 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:38 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 3: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0xffffffb0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:38 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x0, 0x2600}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:31:38 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:38 executing program 3: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x0, 0x2600}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:31:38 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:38 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:38 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:31:39 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:39 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:39 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:40 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:41 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:41 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:41 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:41 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:41 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:41 executing program 0: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:41 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:41 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:42 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 0: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:42 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:42 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:43 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 0: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:44 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:44 executing program 4: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 4: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 4: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 0: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 4: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:45 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 4: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 4: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:46 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:47 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 0: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x95ffffff00000000}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:31:48 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {0x0, 0x0, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:48 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {0x0, 0x0, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 2: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x1e00000000000000}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:31:49 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:49 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0x0, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:50 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {0x0, 0x0, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:50 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 0: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0x0, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:51 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {0x0, 0x0, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 3: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:51 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:52 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:52 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:52 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0x0, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:52 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:52 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:52 executing program 0: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:52 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:52 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 0: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0x0, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:31:53 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:53 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:54 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:54 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:54 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:54 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:54 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:54 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:54 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) close(r0) 10:31:54 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:55 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) close(r0) 10:31:55 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:55 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:55 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:55 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) close(r0) 10:31:55 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:55 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) close(r0) 10:31:55 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:55 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:55 executing program 3: 10:31:55 executing program 0: close(0xffffffffffffffff) 10:31:55 executing program 3: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x40000000, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) getgroups(0x0, 0x0) 10:31:55 executing program 0: close(0xffffffffffffffff) 10:31:56 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:56 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:56 executing program 0: close(0xffffffffffffffff) 10:31:56 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:56 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) 10:31:56 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:56 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:56 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:56 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) 10:31:56 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00\x00\xc3\x00', 0x40004002}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) 10:31:56 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) 10:31:56 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 10:31:56 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:57 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:57 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:57 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) close(0xffffffffffffffff) 10:31:57 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:57 executing program 1: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:57 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) close(0xffffffffffffffff) 10:31:57 executing program 3: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:31:57 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) close(0xffffffffffffffff) 10:31:57 executing program 1: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 1093.042643] ISOFS: Unable to identify CD-ROM format. 10:31:57 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:57 executing program 1: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r1, 0x0, 0x807fffff) [ 1093.275118] ISOFS: Unable to identify CD-ROM format. 10:31:57 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:57 executing program 3: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r2, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) futimesat(r0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0405405, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) 10:31:57 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:58 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r2, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 10:31:58 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:58 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:58 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:58 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 10:31:58 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:58 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:58 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:58 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 1094.132406] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.139119] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.193233] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.238875] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.269416] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.285626] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.305543] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.322870] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 10:31:58 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:58 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 1094.339812] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.363580] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.383167] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1094.408889] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 10:31:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', 0x0, 0x0, 0x0) 10:31:59 executing program 0: pipe(&(0x7f0000000380)={0xffffffffffffffff}) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/7, 0x7}], 0x1) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 10:31:59 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:59 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:59 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:59 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:59 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:59 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:59 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:31:59 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r0, 0x0, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/181, 0xb5}], 0x1) 10:31:59 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:31:59 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 10:32:00 executing program 3: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') getdents64(r0, &(0x7f0000000200)=""/116, 0x184) 10:32:00 executing program 0: syslog(0x3, &(0x7f0000000140)=""/197, 0xfffc) 10:32:00 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 10:32:00 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:00 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:00 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:00 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 10:32:00 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:00 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:00 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 10:32:00 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f00000008c0), 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup2(r1, r0) ioctl$sock_ifreq(r2, 0x8992, &(0x7f0000000600)={'gre0\x00', @ifru_hwaddr}) 10:32:00 executing program 3: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f00000000c0), 0x2c3) 10:32:00 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:00 executing program 1: 10:32:00 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:01 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:01 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f00000008c0), 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:01 executing program 3: 10:32:01 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:01 executing program 1: 10:32:01 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:01 executing program 3: 10:32:01 executing program 1: 10:32:01 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f00000008c0), 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:01 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:01 executing program 1: 10:32:01 executing program 3: 10:32:02 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:02 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:02 executing program 1: 10:32:02 executing program 3: 10:32:02 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f00000008c0), 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:02 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:02 executing program 3: 10:32:02 executing program 1: 10:32:02 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f00000008c0), 0x0) 10:32:02 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:02 executing program 1: 10:32:02 executing program 3: 10:32:03 executing program 1: 10:32:03 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:03 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:03 executing program 3: 10:32:03 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:03 executing program 1: 10:32:03 executing program 3: 10:32:03 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:03 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f00000008c0), 0x0) 10:32:03 executing program 3: 10:32:03 executing program 1: 10:32:03 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:03 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x4240a3c3) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 10:32:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='\x00 &X\v\x00\x00\x00\x00\x00\b') r1 = openat$cgroup_ro(r0, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x51}], 0x1, 0x20001003) 10:32:03 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) sendmmsg(r0, &(0x7f0000005f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000041) 10:32:03 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:03 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:03 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 10:32:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev_snmp6\x00') openat$cgroup_ro(r0, &(0x7f00000001c0)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX\x01\x00=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xccM\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r\x96\xcc\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xe6i\xcf\x15\xb3h\nw$\xb4>\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd', 0x0, 0x0) 10:32:04 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f00000008c0), 0x0) 10:32:04 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:04 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x1) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:05 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:05 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:05 executing program 2: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:05 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 0: futex(0x0, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:06 executing program 2: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 0: futex(0x0, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:06 executing program 2: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 0: futex(0x0, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:06 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 2: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:06 executing program 0: futex(&(0x7f0000000040), 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:06 executing program 2: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 0: futex(&(0x7f0000000040), 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:07 executing program 2: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 0: futex(&(0x7f0000000040), 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:07 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:07 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:07 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:07 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:08 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:08 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:08 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:08 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(0x0, 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:08 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:08 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(0x0, 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:09 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:09 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:09 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:10 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:10 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:10 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:10 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:10 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:10 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:10 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(0x0, 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:10 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:10 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:10 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:11 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:11 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:11 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:11 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:11 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:12 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:12 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:12 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:13 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0) 10:32:13 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:13 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:13 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:14 executing program 1: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 1: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 1: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:14 executing program 1: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:15 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 1: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 4: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:15 executing program 1: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:15 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 0: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:16 executing program 4: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:16 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:16 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 4: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:17 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 4: futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:17 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:17 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 4: futex(0x0, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:18 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 4: futex(0x0, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:18 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 4: futex(0x0, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:18 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 4: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:18 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:18 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:19 executing program 4: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:19 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 4: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:20 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:20 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:21 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 3: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 3: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 3: clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 3: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:22 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 3: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 3: mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:23 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:24 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, 0x0}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 4: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:32:25 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:25 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0x0, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:26 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:26 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 4: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:32:32 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:32 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 1131.014432] IPVS: ftp: loaded support on port[0] = 21 [ 1131.215615] chnl_net:caif_netlink_parms(): no params data found [ 1131.253321] bridge0: port 1(bridge_slave_0) entered blocking state [ 1131.259734] bridge0: port 1(bridge_slave_0) entered disabled state [ 1131.266875] device bridge_slave_0 entered promiscuous mode [ 1131.276225] bridge0: port 2(bridge_slave_1) entered blocking state [ 1131.282659] bridge0: port 2(bridge_slave_1) entered disabled state [ 1131.289840] device bridge_slave_1 entered promiscuous mode [ 1131.458112] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1131.469762] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1131.488384] team0: Port device team_slave_0 added [ 1131.495295] team0: Port device team_slave_1 added [ 1131.553620] device hsr_slave_0 entered promiscuous mode [ 1131.591280] device hsr_slave_1 entered promiscuous mode [ 1131.817466] bridge0: port 2(bridge_slave_1) entered blocking state [ 1131.823887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1131.830447] bridge0: port 1(bridge_slave_0) entered blocking state [ 1131.837115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1132.039561] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1132.049599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1132.056926] bridge0: port 1(bridge_slave_0) entered disabled state [ 1132.067053] bridge0: port 2(bridge_slave_1) entered disabled state [ 1132.074851] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1132.086981] 8021q: adding VLAN 0 to HW filter on device team0 [ 1132.100249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1132.108543] bridge0: port 1(bridge_slave_0) entered blocking state [ 1132.114992] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1132.282839] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1132.290625] bridge0: port 2(bridge_slave_1) entered blocking state [ 1132.297052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1132.305391] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1132.314275] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1132.326153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1132.334772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1132.350076] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1132.360493] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1132.371780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1132.380461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1132.388378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1132.396255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1132.553396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1132.570628] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1132.593187] device bridge_slave_1 left promiscuous mode [ 1132.598756] bridge0: port 2(bridge_slave_1) entered disabled state 10:32:37 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:37 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:37 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:37 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100000000, 0x4) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000040)=""/164, 0xa4, &(0x7f0000000180)=""/58, 0x1}}, 0x68) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:37 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:37 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) [ 1132.672068] device bridge_slave_0 left promiscuous mode [ 1132.677673] bridge0: port 1(bridge_slave_0) entered disabled state 10:32:37 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:37 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:38 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:38 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:38 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:38 executing program 5: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:38 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x0, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:38 executing program 0: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x0, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:38 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:39 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:39 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:39 executing program 5: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:39 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x0, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0x0, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:39 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:39 executing program 0: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x0, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:39 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x0, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:40 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:40 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:40 executing program 5: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:40 executing program 2: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x1f00000000000000, @tick, {}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:32:41 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:32:41 executing program 0: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x0, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:41 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x0, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:41 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0x0, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:41 executing program 4: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@mcast2, 0x0, 0x32}, 0x0, @in6=@loopback}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)={0x2, 0xd, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="021200001100000026bd7000fcdbdf2501001400790000000800120003000000000000003800000046003270b4a69956a98fe40000000000ac1414bb0000000000000000000400000000000000000000000000000000000004000400170000001f000000000700003f00000000000000030000000000120002000b00050000000100000000000000"], 0x88}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 10:32:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:41 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:41 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:42 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:42 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:42 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x0, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:42 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0x0, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:42 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:43 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:43 executing program 5: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x1000000, @tick, {}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:32:43 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:43 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x0, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:43 executing program 5: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x2200, @tick, {}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:32:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x0, 0x200, 0x0, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:44 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x0, 0x6bf, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:44 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:44 executing program 5: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0x0, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:44 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:44 executing program 1: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_normal='map=normal'}, {@utf8='utf8'}], [{@uid_eq={'uid'}}, {@euid_gt={'euid>'}}, {@euid_eq={'euid'}}, {@subj_role={'subj_role', 0x3d, 'ramfs\x00'}}]}) 10:32:44 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:45 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:45 executing program 4: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x2100000000000000, 0x0, @tick, {}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:32:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:45 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:45 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:45 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) 10:32:45 executing program 5: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:45 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x0, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:45 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) [ 1141.162706] JFS: Cannot determine volume size 10:32:45 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) [ 1141.517350] JFS: Cannot determine volume size 10:32:46 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:46 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) [ 1141.927994] JFS: Cannot determine volume size 10:32:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:46 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:46 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) 10:32:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:46 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:46 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:47 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) 10:32:47 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) 10:32:47 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:47 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) 10:32:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:48 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) 10:32:48 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:48 executing program 5: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:48 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:48 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) 10:32:48 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:48 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@resize='resize'}, {@integrity='integrity'}, {@gid={'gid'}}, {@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xa0000000}}], [{@audit='audit'}]}) [ 1144.424763] JFS: Cannot determine volume size 10:32:49 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:49 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:49 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:49 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:49 executing program 5: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:49 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:49 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:49 executing program 1: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:50 executing program 4: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = memfd_create(&(0x7f0000000440)='\xea7y\xd8\x0e\xfaE\xbb\xbe\x00\x17q\x91\xc9\xa9\x95\x99\xea\xe1\xf1\x15\xbb\x7fH\xdf\xbc\x95\x87\v\xd0\xcd\x19\xbd(0`\xe2f\x82~\xf3K\x82w.\xbd]A[\xde{\xf3\f\xedey\xaa\x0ew\xc6P\x95\x1e\t\xbcI\a\x96\xc9\x1a\xc7\xc6N\x95\x8d\xef\xbf\xbe\xa6\xf3T7\f\xe5\x8bV\xe4\xf5\x82\x03\x13\xd7\x18\x88\xc0\xc3B\xb4\xcck\x82\x90}\x98\x97\xa1m\x14@?\xee\x9f\xfb\xe7\x880\x8f\xefz\xc8\xfc,\x83\xaa1\x10\xf5\x815}\xdd\x17\xde18\x1d.\x1c\xf8(\xce\xa4{\xd0\xa58\xa7\xdb\xf8\xea\x91\xf1\"c\x1b\x16\xa4W\n*.I\x83w\x84\x8b\xf2\xd1Z\xdb\xe7\xad\x03:<\xcf\xac\xf5\x18\x88cp\x82\xea-lk\xc7*l\xb7[\xb4\x89\x8a\xf0\"\x8aE\xa4\x95/\x8c\x17\xac1\xd2\xf5\xcd\xaf\xadX\x1f%Xn\xbf\xc90\xea\xbfXs\xc5o\x94q\xf0\xb2/T)[\xa0M\x04\xe9.f\xd5ew\x91lAe', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x2200, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 10:32:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:50 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:50 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:51 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x8c02) write(r0, &(0x7f0000000000)="b63d06003f0004000000ed69d2bc7037cebc82c2de96aa0faeaa6f1602b9107d425db695bbe9cad006de5db6ec75d2e1", 0x30) ioctl$SG_GET_NUM_WAITING(r0, 0x5382, &(0x7f0000000080)) 10:32:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:51 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:51 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:51 executing program 4: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:52 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:52 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:52 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1148.533357] FAULT_INJECTION: forcing a failure. [ 1148.533357] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.651006] CPU: 1 PID: 18745 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1148.658387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1148.668629] Call Trace: [ 1148.671292] dump_stack+0x172/0x1f0 [ 1148.674998] should_fail.cold+0xa/0x1b [ 1148.678949] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1148.684082] ? lock_downgrade+0x810/0x810 [ 1148.688393] ? ___might_sleep+0x163/0x280 [ 1148.692579] __should_failslab+0x121/0x190 [ 1148.696841] should_failslab+0x9/0x14 [ 1148.700663] __kmalloc+0x2dc/0x740 [ 1148.704259] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1148.709819] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1148.715375] ? strnlen_user+0x1f0/0x280 [ 1148.719381] ? __x64_sys_memfd_create+0x13c/0x470 [ 1148.724255] __x64_sys_memfd_create+0x13c/0x470 [ 1148.729062] ? memfd_fcntl+0x1550/0x1550 [ 1148.733157] ? do_syscall_64+0x26/0x610 [ 1148.737155] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1148.741822] ? trace_hardirqs_on+0x67/0x230 [ 1148.746176] do_syscall_64+0x103/0x610 [ 1148.750129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1148.755339] RIP: 0033:0x457e29 [ 1148.758641] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1148.778802] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1148.786530] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1148.793819] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 10:32:53 executing program 5 (fault-call:8 fault-nth:0): mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 1148.801105] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1148.808394] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf11ff06d4 [ 1148.815690] R13: 00000000004c6757 R14: 00000000004dbd08 R15: 0000000000000003 [ 1148.995007] FAULT_INJECTION: forcing a failure. [ 1148.995007] name failslab, interval 1, probability 0, space 0, times 0 [ 1149.057470] CPU: 0 PID: 18750 Comm: syz-executor.5 Not tainted 5.0.0-rc8 #88 [ 1149.064710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.075311] Call Trace: [ 1149.077956] dump_stack+0x172/0x1f0 [ 1149.081647] should_fail.cold+0xa/0x1b [ 1149.085575] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1149.090695] ? lock_downgrade+0x810/0x810 [ 1149.094863] ? ___might_sleep+0x163/0x280 [ 1149.099036] __should_failslab+0x121/0x190 [ 1149.103288] should_failslab+0x9/0x14 [ 1149.107105] kmem_cache_alloc+0x2b2/0x6f0 [ 1149.111267] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1149.116838] ? apparmor_capable+0x2bb/0x5d0 [ 1149.121187] ? cap_capable+0x205/0x270 [ 1149.125096] getname_flags+0xd6/0x5b0 [ 1149.128943] user_path_mountpoint_at+0x29/0x50 [ 1149.133602] ksys_umount+0x164/0xe70 [ 1149.137344] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1149.142934] ? fput+0x128/0x1a0 [ 1149.146232] ? ksys_write+0x166/0x1f0 [ 1149.150049] ? __detach_mounts+0x320/0x320 [ 1149.154364] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1149.159132] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1149.163902] ? do_syscall_64+0x26/0x610 [ 1149.167943] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.174486] ? do_syscall_64+0x26/0x610 [ 1149.178473] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1149.183133] __x64_sys_umount+0x54/0x80 [ 1149.187126] do_syscall_64+0x103/0x610 [ 1149.191035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.196231] RIP: 0033:0x457e29 [ 1149.199434] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1149.218347] RSP: 002b:00007fd14e8dfc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1149.226066] RAX: ffffffffffffffda RBX: 00007fd14e8dfc90 RCX: 0000000000457e29 [ 1149.233345] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 1149.240622] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1149.248076] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd14e8e06d4 [ 1149.255354] R13: 00000000004c6c24 R14: 00000000004dc398 R15: 0000000000000005 10:32:53 executing program 2 (fault-call:9 fault-nth:0): mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:53 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:53 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:53 executing program 1 (fault-call:0 fault-nth:0): futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1149.488978] FAULT_INJECTION: forcing a failure. [ 1149.488978] name fail_futex, interval 1, probability 0, space 0, times 1 [ 1149.505125] CPU: 0 PID: 18762 Comm: syz-executor.1 Not tainted 5.0.0-rc8 #88 [ 1149.512345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.521708] Call Trace: [ 1149.524324] dump_stack+0x172/0x1f0 [ 1149.527991] should_fail.cold+0xa/0x1b [ 1149.531937] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1149.537157] ? _kstrtoul+0x170/0x170 [ 1149.540977] ? get_pid_task+0xd4/0x190 [ 1149.544955] get_futex_key+0xb9a/0x1690 [ 1149.548979] ? lock_downgrade+0x810/0x810 [ 1149.553149] ? futex_lock_pi_atomic+0x2e0/0x2e0 [ 1149.557861] ? kasan_check_read+0x11/0x20 [ 1149.562043] do_futex+0x949/0x1d50 [ 1149.565604] ? find_held_lock+0x35/0x130 [ 1149.569692] ? exit_robust_list+0x290/0x290 [ 1149.574106] ? lock_downgrade+0x810/0x810 [ 1149.579587] ? kasan_check_write+0x14/0x20 [ 1149.583843] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1149.588835] ? wait_for_completion+0x440/0x440 [ 1149.593437] ? __sb_end_write+0xd9/0x110 [ 1149.597525] __x64_sys_futex+0x3f7/0x590 [ 1149.601615] ? do_futex+0x1d50/0x1d50 [ 1149.605504] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1149.610279] ? do_syscall_64+0x26/0x610 [ 1149.614274] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.619659] ? do_syscall_64+0x26/0x610 [ 1149.623653] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1149.628367] ? trace_hardirqs_on+0x67/0x230 [ 1149.632721] do_syscall_64+0x103/0x610 [ 1149.636635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.641840] RIP: 0033:0x457e29 [ 1149.645052] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1149.663971] RSP: 002b:00007f9dc803fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1149.671775] RAX: ffffffffffffffda RBX: 00007f9dc803fc90 RCX: 0000000000457e29 [ 1149.680339] RDX: 0000000000000000 RSI: 0000800000000005 RDI: 000000002000cffc 10:32:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x841, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x6, 0xc0010, 0x8, 0x6bf, 0x0, 0x0, 0x3, 0x1, 0x400, 0x0, 0x80, 0x0, 0x1, 0x7, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x7, 0xebb2ec21e6bb6ea0, @perf_bp={0x0}, 0x10, 0x200, 0xfffffffffffffffa, 0x0, 0x9, 0x6}, 0x0, 0xc, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) open(0x0, 0x0, 0xe9) lgetxattr(&(0x7f0000001580)='./file0\x00', 0x0, &(0x7f0000001600)=""/137, 0x89) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) add_key(&(0x7f0000001300)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) 10:32:54 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 1149.687621] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1149.694904] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9dc80406d4 [ 1149.702221] R13: 00000000004be69a R14: 00000000004cf228 R15: 0000000000000003 [ 1149.726013] FAULT_INJECTION: forcing a failure. [ 1149.726013] name failslab, interval 1, probability 0, space 0, times 0 [ 1149.768070] FAULT_INJECTION: forcing a failure. [ 1149.768070] name failslab, interval 1, probability 0, space 0, times 0 [ 1149.783367] CPU: 1 PID: 18760 Comm: syz-executor.2 Not tainted 5.0.0-rc8 #88 [ 1149.790645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.790652] Call Trace: [ 1149.790686] dump_stack+0x172/0x1f0 [ 1149.790713] should_fail.cold+0xa/0x1b [ 1149.810190] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1149.815322] ? lock_downgrade+0x810/0x810 [ 1149.819493] ? ___might_sleep+0x163/0x280 [ 1149.819513] __should_failslab+0x121/0x190 [ 1149.819533] should_failslab+0x9/0x14 [ 1149.819549] kmem_cache_alloc+0x2b2/0x6f0 [ 1149.819565] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1149.819580] ? apparmor_capable+0x2bb/0x5d0 [ 1149.819596] ? cap_capable+0x205/0x270 [ 1149.850052] getname_flags+0xd6/0x5b0 [ 1149.853877] user_path_mountpoint_at+0x29/0x50 [ 1149.858638] ksys_umount+0x164/0xe70 [ 1149.862384] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1149.867963] ? fput+0x128/0x1a0 [ 1149.871268] ? ksys_write+0x166/0x1f0 [ 1149.875209] ? __detach_mounts+0x320/0x320 [ 1149.880550] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1149.885386] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1149.890166] ? do_syscall_64+0x26/0x610 [ 1149.894165] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.899558] ? do_syscall_64+0x26/0x610 [ 1149.903555] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1149.908168] __x64_sys_umount+0x54/0x80 [ 1149.912163] do_syscall_64+0x103/0x610 [ 1149.916076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.921296] RIP: 0033:0x457e29 [ 1149.924525] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1149.943660] RSP: 002b:00007fee3bb39c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1149.951402] RAX: ffffffffffffffda RBX: 00007fee3bb39c90 RCX: 0000000000457e29 [ 1149.958706] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 10:32:54 executing program 1 (fault-call:0 fault-nth:1): futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1149.965993] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1149.973278] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee3bb3a6d4 [ 1149.981574] R13: 00000000004c6c24 R14: 00000000004dc398 R15: 0000000000000005 [ 1150.017286] CPU: 0 PID: 18766 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1150.024508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1150.024514] Call Trace: [ 1150.024537] dump_stack+0x172/0x1f0 [ 1150.024562] should_fail.cold+0xa/0x1b [ 1150.044219] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1150.049345] ? lock_downgrade+0x810/0x810 [ 1150.053517] ? ___might_sleep+0x163/0x280 [ 1150.053537] __should_failslab+0x121/0x190 [ 1150.053573] ? shmem_destroy_callback+0xc0/0xc0 [ 1150.053590] should_failslab+0x9/0x14 [ 1150.053605] kmem_cache_alloc+0x2b2/0x6f0 [ 1150.053621] ? __alloc_fd+0x430/0x530 [ 1150.053639] ? shmem_destroy_callback+0xc0/0xc0 [ 1150.053655] shmem_alloc_inode+0x1c/0x50 [ 1150.053671] alloc_inode+0x66/0x190 [ 1150.053685] new_inode_pseudo+0x19/0xf0 [ 1150.053699] new_inode+0x1f/0x40 [ 1150.053714] shmem_get_inode+0x84/0x780 [ 1150.053736] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1150.053755] shmem_file_setup+0x66/0x90 [ 1150.067972] FAULT_INJECTION: forcing a failure. [ 1150.067972] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1150.070799] __x64_sys_memfd_create+0x2a2/0x470 [ 1150.070819] ? memfd_fcntl+0x1550/0x1550 [ 1150.070834] ? do_syscall_64+0x26/0x610 [ 1150.070852] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1150.133050] ? trace_hardirqs_on+0x67/0x230 [ 1150.133071] do_syscall_64+0x103/0x610 [ 1150.133093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1150.133107] RIP: 0033:0x457e29 [ 1150.133121] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1150.146131] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1150.146146] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1150.146155] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1150.146164] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1150.146180] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf11ff06d4 [ 1150.146189] R13: 00000000004c6757 R14: 00000000004dbd08 R15: 0000000000000003 [ 1150.225592] CPU: 1 PID: 18773 Comm: syz-executor.1 Not tainted 5.0.0-rc8 #88 [ 1150.232810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1150.242177] Call Trace: [ 1150.244790] dump_stack+0x172/0x1f0 [ 1150.248569] should_fail.cold+0xa/0x1b [ 1150.252489] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1150.257621] ? _kstrtoul+0x170/0x170 [ 1150.261356] ? get_pid_task+0xd4/0x190 [ 1150.265277] get_futex_key+0x233/0x1690 [ 1150.269291] ? lock_downgrade+0x810/0x810 [ 1150.273537] ? futex_lock_pi_atomic+0x2e0/0x2e0 [ 1150.278294] ? kasan_check_read+0x11/0x20 [ 1150.282471] do_futex+0x949/0x1d50 [ 1150.287113] ? find_held_lock+0x35/0x130 [ 1150.291319] ? exit_robust_list+0x290/0x290 [ 1150.295658] ? lock_downgrade+0x810/0x810 [ 1150.299839] ? kasan_check_write+0x14/0x20 [ 1150.304101] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1150.308990] ? wait_for_completion+0x440/0x440 [ 1150.313596] ? __sb_end_write+0xd9/0x110 [ 1150.317690] __x64_sys_futex+0x3f7/0x590 [ 1150.321783] ? do_futex+0x1d50/0x1d50 [ 1150.325600] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1150.330399] ? do_syscall_64+0x26/0x610 [ 1150.334390] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1150.339775] ? do_syscall_64+0x26/0x610 [ 1150.343786] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1150.348427] ? trace_hardirqs_on+0x67/0x230 [ 1150.352776] do_syscall_64+0x103/0x610 [ 1150.356701] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1150.361907] RIP: 0033:0x457e29 [ 1150.365148] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1150.384067] RSP: 002b:00007f9dc803fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1150.392750] RAX: ffffffffffffffda RBX: 00007f9dc803fc90 RCX: 0000000000457e29 [ 1150.400295] RDX: 0000000000000000 RSI: 0000800000000005 RDI: 000000002000cffc [ 1150.407596] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 10:32:54 executing program 2 (fault-call:9 fault-nth:1): mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:54 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 1150.415040] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9dc80406d4 [ 1150.422325] R13: 00000000004be69a R14: 00000000004cf228 R15: 0000000000000003 10:32:55 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1150.644124] FAULT_INJECTION: forcing a failure. [ 1150.644124] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1150.655989] CPU: 0 PID: 18784 Comm: syz-executor.2 Not tainted 5.0.0-rc8 #88 [ 1150.663196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1150.672569] Call Trace: [ 1150.675195] dump_stack+0x172/0x1f0 [ 1150.678861] should_fail.cold+0xa/0x1b [ 1150.682891] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1150.689128] should_fail_alloc_page+0x50/0x60 [ 1150.693674] __alloc_pages_nodemask+0x1a1/0x710 [ 1150.698369] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1150.703408] ? find_held_lock+0x35/0x130 [ 1150.707510] cache_grow_begin+0x9c/0x8c0 [ 1150.711599] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1150.717164] ? check_preemption_disabled+0x48/0x290 [ 1150.722338] kmem_cache_alloc+0x62d/0x6f0 [ 1150.726509] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1150.732070] ? apparmor_capable+0x2bb/0x5d0 [ 1150.736425] getname_flags+0xd6/0x5b0 [ 1150.740260] user_path_mountpoint_at+0x29/0x50 [ 1150.744872] ksys_umount+0x164/0xe70 [ 1150.748634] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1150.754202] ? fput+0x128/0x1a0 [ 1150.757509] ? ksys_write+0x166/0x1f0 [ 1150.761333] ? __detach_mounts+0x320/0x320 [ 1150.765616] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1150.770393] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1150.775181] ? do_syscall_64+0x26/0x610 [ 1150.779193] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1150.784581] ? do_syscall_64+0x26/0x610 [ 1150.789785] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1150.794398] __x64_sys_umount+0x54/0x80 [ 1150.798396] do_syscall_64+0x103/0x610 [ 1150.802318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1150.807525] RIP: 0033:0x457e29 [ 1150.810738] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1150.829744] RSP: 002b:00007fee3bb5ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1150.829760] RAX: ffffffffffffffda RBX: 00007fee3bb5ac90 RCX: 0000000000457e29 [ 1150.829769] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 1150.829778] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1150.829787] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee3bb5b6d4 [ 1150.829795] R13: 00000000004c6c24 R14: 00000000004dc398 R15: 0000000000000005 10:32:55 executing program 1: futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1150.975423] FAULT_INJECTION: forcing a failure. [ 1150.975423] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1150.987691] CPU: 1 PID: 18790 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1150.996124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1151.005487] Call Trace: [ 1151.008103] dump_stack+0x172/0x1f0 [ 1151.011758] should_fail.cold+0xa/0x1b [ 1151.015666] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1151.020798] ? mark_held_locks+0x100/0x100 [ 1151.025065] should_fail_alloc_page+0x50/0x60 [ 1151.029646] __alloc_pages_nodemask+0x1a1/0x710 [ 1151.034341] ? find_held_lock+0x35/0x130 [ 1151.038430] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1151.043479] cache_grow_begin+0x9c/0x8c0 [ 1151.047561] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1151.053124] ? check_preemption_disabled+0x48/0x290 [ 1151.058166] kmem_cache_alloc+0x62d/0x6f0 [ 1151.062452] ? shmem_destroy_callback+0xc0/0xc0 [ 1151.067142] shmem_alloc_inode+0x1c/0x50 [ 1151.071227] alloc_inode+0x66/0x190 [ 1151.074872] new_inode_pseudo+0x19/0xf0 [ 1151.078867] new_inode+0x1f/0x40 [ 1151.082253] shmem_get_inode+0x84/0x780 [ 1151.086251] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1151.091120] shmem_file_setup+0x66/0x90 [ 1151.096063] __x64_sys_memfd_create+0x2a2/0x470 [ 1151.100758] ? memfd_fcntl+0x1550/0x1550 [ 1151.104840] ? do_syscall_64+0x26/0x610 [ 1151.108831] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1151.113431] ? trace_hardirqs_on+0x67/0x230 [ 1151.117774] do_syscall_64+0x103/0x610 [ 1151.121693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1151.126903] RIP: 0033:0x457e29 [ 1151.130142] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1151.149108] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1151.156833] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1151.164114] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 10:32:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:32:55 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x2) [ 1151.171396] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1151.178686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf11ff06d4 [ 1151.185985] R13: 00000000004c6757 R14: 00000000004dbd08 R15: 0000000000000003 10:32:55 executing program 1: futex(&(0x7f000000cffc)=0x10, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:55 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:55 executing program 2 (fault-call:9 fault-nth:2): mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:55 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 10:32:56 executing program 1: futex(&(0x7f000000cffc)=0x1f00, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:56 executing program 0: [ 1151.490089] FAULT_INJECTION: forcing a failure. [ 1151.490089] name failslab, interval 1, probability 0, space 0, times 0 [ 1151.580389] CPU: 0 PID: 18808 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1151.587618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1151.596974] Call Trace: [ 1151.599576] dump_stack+0x172/0x1f0 [ 1151.603246] should_fail.cold+0xa/0x1b [ 1151.607153] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1151.612283] ? lock_downgrade+0x810/0x810 [ 1151.616454] ? ___might_sleep+0x163/0x280 [ 1151.620620] __should_failslab+0x121/0x190 [ 1151.624862] should_failslab+0x9/0x14 [ 1151.628689] kmem_cache_alloc+0x2b2/0x6f0 [ 1151.632866] __alloc_file+0x27/0x300 [ 1151.636589] alloc_empty_file+0x72/0x170 [ 1151.640666] alloc_file+0x5e/0x4d0 [ 1151.644219] alloc_file_pseudo+0x189/0x280 [ 1151.648474] ? alloc_file+0x4d0/0x4d0 [ 1151.648495] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1151.648514] ? kasan_check_write+0x14/0x20 [ 1151.648535] __shmem_file_setup.part.0+0x108/0x2b0 [ 1151.648555] shmem_file_setup+0x66/0x90 [ 1151.648579] __x64_sys_memfd_create+0x2a2/0x470 [ 1151.648596] ? memfd_fcntl+0x1550/0x1550 [ 1151.657935] ? do_syscall_64+0x26/0x610 [ 1151.657953] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1151.657969] ? trace_hardirqs_on+0x67/0x230 [ 1151.657989] do_syscall_64+0x103/0x610 [ 1151.658009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1151.658021] RIP: 0033:0x457e29 [ 1151.658036] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:32:56 executing program 0: [ 1151.658048] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1151.731584] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1151.739030] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1151.746298] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1151.753566] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf11ff06d4 [ 1151.760839] R13: 00000000004c6757 R14: 00000000004dbd08 R15: 0000000000000003 10:32:56 executing program 1: futex(&(0x7f000000cffc)=0x4000, 0x800000000005, 0x0, 0x0, 0x0, 0x0) 10:32:56 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1151.784782] FAULT_INJECTION: forcing a failure. [ 1151.784782] name failslab, interval 1, probability 0, space 0, times 0 10:32:56 executing program 0: getpgid(0xffffffffffffffff) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/uts\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) [ 1151.873642] FAULT_INJECTION: forcing a failure. [ 1151.873642] name failslab, interval 1, probability 0, space 0, times 0 [ 1151.881063] CPU: 1 PID: 18822 Comm: syz-executor.2 Not tainted 5.0.0-rc8 #88 [ 1151.892071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1151.892077] Call Trace: [ 1151.892101] dump_stack+0x172/0x1f0 [ 1151.892121] should_fail.cold+0xa/0x1b [ 1151.892140] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1151.892157] ? lock_downgrade+0x810/0x810 [ 1151.892193] ? ___might_sleep+0x163/0x280 [ 1151.892212] __should_failslab+0x121/0x190 [ 1151.892231] should_failslab+0x9/0x14 [ 1151.892248] kmem_cache_alloc_trace+0x2d1/0x760 [ 1151.892264] ? mutex_trylock+0x1e0/0x1e0 [ 1151.892279] ? kasan_check_write+0x14/0x20 [ 1151.892303] kobject_uevent_env+0x2fb/0x1030 [ 1151.892321] ? wait_for_completion+0x440/0x440 [ 1151.892342] kobject_uevent+0x20/0x26 [ 1151.892451] device_del+0x6c5/0xb60 [ 1151.892472] ? __device_links_no_driver+0x270/0x270 [ 1151.929816] ? mntput+0x74/0xa0 [ 1151.929835] ? simple_release_fs+0xa1/0xd0 [ 1151.929865] device_unregister+0x15/0x30 [ 1151.929880] bdi_unregister+0x41c/0x5e0 [ 1151.951080] ? wb_blkcg_offline+0x120/0x120 [ 1151.951097] ? refcount_inc_checked+0x70/0x70 [ 1151.951114] ? lock_downgrade+0x810/0x810 [ 1151.951127] ? lock_downgrade+0x810/0x810 [ 1151.951147] bdi_put+0x151/0x180 [ 1151.951167] generic_shutdown_super+0x2b2/0x370 [ 1151.951184] kill_anon_super+0x3e/0x60 [ 1151.951256] fuse_kill_sb_anon+0x1e/0x30 [ 1151.951275] deactivate_locked_super+0x9a/0x100 [ 1151.951306] deactivate_super+0x1bd/0x1e0 [ 1151.951323] ? mount_ns+0x1d0/0x1d0 [ 1151.951355] ? dput+0x38/0x6a0 [ 1152.032968] ? dput+0x1e6/0x6a0 [ 1152.036271] cleanup_mnt+0xbf/0x160 [ 1152.039901] __cleanup_mnt+0x16/0x20 [ 1152.043626] task_work_run+0x14a/0x1c0 [ 1152.047529] exit_to_usermode_loop+0x273/0x2c0 [ 1152.052157] do_syscall_64+0x52d/0x610 [ 1152.056058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1152.061261] RIP: 0033:0x457e29 [ 1152.064475] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1152.083382] RSP: 002b:00007fee3baf7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1152.091100] RAX: 0000000000000000 RBX: 00007fee3baf7c90 RCX: 0000000000457e29 [ 1152.098823] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 1152.106107] RBP: 000000000073c0e0 R08: 0000000000000000 R09: 0000000000000000 [ 1152.113388] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee3baf86d4 [ 1152.120660] R13: 00000000004c6c24 R14: 00000000004dc398 R15: 0000000000000004 [ 1152.128451] CPU: 0 PID: 18829 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1152.135667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1152.145018] Call Trace: [ 1152.147620] dump_stack+0x172/0x1f0 [ 1152.151266] should_fail.cold+0xa/0x1b [ 1152.151286] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1152.151303] ? lock_downgrade+0x810/0x810 [ 1152.151322] ? ___might_sleep+0x163/0x280 [ 1152.151341] __should_failslab+0x121/0x190 [ 1152.151359] should_failslab+0x9/0x14 [ 1152.151375] kmem_cache_alloc_trace+0x2d1/0x760 [ 1152.151389] ? ___might_sleep+0x163/0x280 [ 1152.151407] ? __might_sleep+0x95/0x190 [ 1152.151429] apparmor_file_alloc_security+0x112/0x940 [ 1152.151451] security_file_alloc+0x69/0xb0 [ 1152.151470] __alloc_file+0xac/0x300 [ 1152.151488] alloc_empty_file+0x72/0x170 [ 1152.151506] alloc_file+0x5e/0x4d0 [ 1152.160512] alloc_file_pseudo+0x189/0x280 [ 1152.160532] ? alloc_file+0x4d0/0x4d0 [ 1152.160554] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1152.160573] ? kasan_check_write+0x14/0x20 [ 1152.160595] __shmem_file_setup.part.0+0x108/0x2b0 [ 1152.160616] shmem_file_setup+0x66/0x90 [ 1152.160637] __x64_sys_memfd_create+0x2a2/0x470 [ 1152.160655] ? memfd_fcntl+0x1550/0x1550 [ 1152.160671] ? do_syscall_64+0x26/0x610 [ 1152.160686] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1152.160702] ? trace_hardirqs_on+0x67/0x230 [ 1152.160721] do_syscall_64+0x103/0x610 [ 1152.160742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1152.160754] RIP: 0033:0x457e29 [ 1152.160768] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1152.160775] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1152.160789] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1152.160798] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1152.160810] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 10:32:56 executing program 1: futex(&(0x7f000000cffc)=0x60ff, 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1152.169091] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf11ff06d4 [ 1152.169101] R13: 00000000004c6757 R14: 00000000004dbd08 R15: 0000000000000003 10:32:56 executing program 5: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x1000000) 10:32:56 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:56 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(0x0, 0x0) [ 1152.501185] FAULT_INJECTION: forcing a failure. [ 1152.501185] name failslab, interval 1, probability 0, space 0, times 0 [ 1152.530928] CPU: 1 PID: 18845 Comm: syz-executor.4 Not tainted 5.0.0-rc8 #88 [ 1152.538170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1152.547527] Call Trace: [ 1152.550134] dump_stack+0x172/0x1f0 [ 1152.553815] should_fail.cold+0xa/0x1b [ 1152.557745] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1152.562913] ? lock_downgrade+0x810/0x810 [ 1152.567081] ? ___might_sleep+0x163/0x280 [ 1152.567101] __should_failslab+0x121/0x190 [ 1152.567122] should_failslab+0x9/0x14 [ 1152.579324] kmem_cache_alloc_trace+0x2d1/0x760 [ 1152.584034] ? ___might_sleep+0x163/0x280 [ 1152.584054] ? __might_sleep+0x95/0x190 [ 1152.584074] apparmor_file_alloc_security+0x112/0x940 10:32:57 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) write$vnet(0xffffffffffffffff, &(0x7f0000000240)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 10:32:57 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffd) mmap(&(0x7f00006fc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000140)='\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) 10:32:57 executing program 1: futex(&(0x7f000000cffc)=0x7400, 0x800000000005, 0x0, 0x0, 0x0, 0x0) [ 1152.592190] security_file_alloc+0x69/0xb0 [ 1152.592210] __alloc_file+0xac/0x300 [ 1152.592229] alloc_empty_file+0x72/0x170 [ 1152.592248] alloc_file+0x5e/0x4d0 [ 1152.592268] alloc_file_pseudo+0x189/0x280 [ 1152.592286] ? alloc_file+0x4d0/0x4d0 [ 1152.592308] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1152.592326] ? kasan_check_write+0x14/0x20 [ 1152.592348] __shmem_file_setup.part.0+0x108/0x2b0 [ 1152.592367] shmem_file_setup+0x66/0x90 [ 1152.639940] __x64_sys_memfd_create+0x2a2/0x470 [ 1152.644623] ? memfd_fcntl+0x1550/0x1550 [ 1152.648707] ? do_syscall_64+0x26/0x610 [ 1152.652704] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1152.657298] ? trace_hardirqs_on+0x67/0x230 [ 1152.661640] do_syscall_64+0x103/0x610 [ 1152.665545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1152.670735] RIP: 0033:0x457e29 [ 1152.673939] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1152.692854] RSP: 002b:00007fcf11fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1152.701104] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1152.708389] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1152.715663] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1152.722952] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf11ff06d4 [ 1152.730225] R13: 00000000004c6757 R14: 00000000004dbd08 R15: 0000000000000003 [ 1152.758250] [ 1152.759922] ======================================================