[info] Using makefile-style concurrent boot in runlevel 2. [ 26.439803] audit: type=1800 audit(1543820701.540:21): pid=5840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.27' (ECDSA) to the list of known hosts. 2018/12/03 07:05:20 fuzzer started 2018/12/03 07:05:22 dialing manager at 10.128.0.26:35001 2018/12/03 07:05:22 syscalls: 1 2018/12/03 07:05:22 code coverage: enabled 2018/12/03 07:05:22 comparison tracing: enabled 2018/12/03 07:05:22 setuid sandbox: enabled 2018/12/03 07:05:22 namespace sandbox: enabled 2018/12/03 07:05:22 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/03 07:05:22 fault injection: enabled 2018/12/03 07:05:22 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/03 07:05:22 net packet injection: enabled 2018/12/03 07:05:22 net device setup: enabled 07:08:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) syzkaller login: [ 242.613820] IPVS: ftp: loaded support on port[0] = 21 07:08:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed, 0x0, 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$inet_sctp(r2, &(0x7f0000001640)={&(0x7f0000001500)=@in={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f00000015c0)=[{&(0x7f0000002cc0)="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", 0x540}], 0x1, 0x0, 0x0, 0x40}, 0x1) [ 242.906513] IPVS: ftp: loaded support on port[0] = 21 07:08:38 executing program 2: r0 = socket$inet6(0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000340), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)) mkdir(&(0x7f0000000140)='./file0\x00', 0x40) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, 0x0) mount$fuseblk(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000003c0)={0x0, 0x5}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 243.153359] IPVS: ftp: loaded support on port[0] = 21 07:08:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x20) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5aa8e, 0x2) [ 243.684999] IPVS: ftp: loaded support on port[0] = 21 07:08:39 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0x40605346, &(0x7f0000000140)={0x0, 0x0, 0x0, "71936575000000007a00000000000000000000007400"}) [ 244.148736] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.182429] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.189871] device bridge_slave_0 entered promiscuous mode [ 244.299600] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.322295] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.329691] device bridge_slave_1 entered promiscuous mode [ 244.355822] IPVS: ftp: loaded support on port[0] = 21 [ 244.459574] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 07:08:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) open_by_handle_at(r2, &(0x7f00000000c0)={0x8}, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x6, 0x0, 0x101}}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_open_dev$audion(0x0, 0xffffffffffffffff, 0x100) [ 244.570913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 244.675606] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.685350] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.692937] device bridge_slave_0 entered promiscuous mode [ 244.810340] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.831767] IPVS: ftp: loaded support on port[0] = 21 [ 244.832224] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.850240] device bridge_slave_1 entered promiscuous mode [ 244.980218] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 245.003782] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 245.124550] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 245.153045] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 245.313670] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.330031] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.351884] device bridge_slave_0 entered promiscuous mode [ 245.509468] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 245.526958] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.537705] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.545347] device bridge_slave_1 entered promiscuous mode [ 245.631440] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 245.689985] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 245.713969] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 245.726866] team0: Port device team_slave_0 added [ 245.734796] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 245.752533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.784587] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 245.871577] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.892619] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.900002] device bridge_slave_0 entered promiscuous mode [ 245.919562] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 245.928509] team0: Port device team_slave_1 added [ 245.936108] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 245.973890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 246.049970] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.059247] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.069047] device bridge_slave_1 entered promiscuous mode [ 246.084762] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 246.093522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 246.101873] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.225272] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 246.250320] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 246.271183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.302980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.315472] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 246.343611] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 246.351031] team0: Port device team_slave_0 added [ 246.414834] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 246.424837] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 246.447442] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 246.481722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.501293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.516090] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 246.540207] team0: Port device team_slave_1 added [ 246.574815] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 246.603185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.611219] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.644785] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 246.652448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 246.662656] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 246.682124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 246.703030] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.747172] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.756143] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.770862] device bridge_slave_0 entered promiscuous mode [ 246.783029] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 246.789868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.808435] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.831022] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 246.853093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 246.870331] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.892433] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.901783] device bridge_slave_1 entered promiscuous mode [ 246.917270] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 246.937378] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 246.956495] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.967187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.017219] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 247.048330] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 247.099876] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 247.108549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.118978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.138520] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 247.151872] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.172798] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.180155] device bridge_slave_0 entered promiscuous mode [ 247.251724] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 247.281466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 247.342294] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.353606] team0: Port device team_slave_0 added [ 247.360153] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.369711] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.384275] device bridge_slave_1 entered promiscuous mode [ 247.453362] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.472788] team0: Port device team_slave_1 added [ 247.530565] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 247.546671] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 247.582472] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 247.669465] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 247.679848] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 247.693031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 247.702784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 247.710724] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 247.822485] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 247.829630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.847314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.858393] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 247.884005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 247.907525] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.927278] team0: Port device team_slave_0 added [ 247.936208] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 247.970434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.982903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.003059] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 248.011659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.035225] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 248.045284] team0: Port device team_slave_1 added [ 248.189154] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 248.205263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 248.217217] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.229919] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 248.334890] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.353753] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.360215] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.367312] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.373736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.381383] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 248.405820] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 248.439377] team0: Port device team_slave_0 added [ 248.446837] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 248.475156] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 248.485577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.501762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.525701] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.532070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.538806] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.545237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.557078] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 248.583313] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.594936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.623426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.634049] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 248.641536] team0: Port device team_slave_1 added [ 248.694034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.712940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.748735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 248.772479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.824036] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 248.831230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 248.850107] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.958930] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 248.966525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 248.986763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.039821] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.052071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.068886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.183043] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 249.190182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.212924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.231870] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.259890] team0: Port device team_slave_0 added [ 249.409416] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.432981] team0: Port device team_slave_1 added [ 249.564575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.584619] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.590987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.597699] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.604120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.619784] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 249.661984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.703316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.784961] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.792986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.814673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.983190] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 249.990462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.003190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.032567] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.038940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.045725] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.052087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.079055] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.522138] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.528563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.535292] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.541652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.577637] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.732481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.739891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.440494] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.446916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.453605] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.459979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.482718] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.742241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.592882] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.622505] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.031334] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.053110] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.353306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.446829] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.462237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.469283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.583109] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.589427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.599979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.852021] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.926094] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.079991] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.147075] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.293651] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.320991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.333503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.569454] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.823919] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.863141] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.133670] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.144748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.151837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.312920] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.355800] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.595165] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.794885] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.833430] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.839676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.847612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.176930] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 257.191119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.213050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.283424] 8021q: adding VLAN 0 to HW filter on device team0 [ 257.647976] 8021q: adding VLAN 0 to HW filter on device team0 07:08:52 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000340)=""/28, 0x21f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000380)={0x51, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) r2 = gettid() timer_create(0x0, &(0x7f0000000500)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000013) 07:08:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 258.712410] hrtimer: interrupt took 38833 ns 07:08:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 258.764058] Filesystem requires source device 07:08:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 258.921946] Filesystem requires source device 07:08:54 executing program 2: r0 = socket$inet6(0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000340), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)) mkdir(&(0x7f0000000140)='./file0\x00', 0x40) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, 0x0) mount$fuseblk(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000003c0)={0x0, 0x5}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 07:08:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 259.134865] Filesystem requires source device 07:08:54 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r1, 0x0) 07:08:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)="80d2", 0x2}], 0x1}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f00000002c0)=@nl=@unspec, 0x80, &(0x7f0000001500)=[{&(0x7f0000000500)="fecc858bd4ec", 0x6}], 0x1}, 0x0) [ 259.895802] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 07:08:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000900)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x86100) sendfile(r1, r0, 0x0, 0x100000005) 07:08:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$nfs4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x10020, 0x0) 07:08:55 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r1, 0x0) 07:08:55 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x400000b7, 0x0, 0x2ff], [0xc1]}) 07:08:55 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r1, 0x0) [ 260.093045] kvm [7620]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 260.129040] EXT4-fs (sda1): re-mounted. Opts: 07:08:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) [ 260.214672] EXT4-fs (sda1): re-mounted. Opts: 07:08:55 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) unshare(0x400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00001d3ff4)='./file0/bus\x00', 0x0) r3 = dup2(r2, r0) fsync(r3) 07:08:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$nfs4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x10020, 0x0) 07:08:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:55 executing program 5: 07:08:55 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r1, 0x0) 07:08:55 executing program 5: 07:08:55 executing program 4: 07:08:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:55 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, 0xffffffffffffffff, 0x0) [ 260.471224] EXT4-fs (sda1): re-mounted. Opts: 07:08:55 executing program 5: 07:08:55 executing program 4: 07:08:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) 07:08:56 executing program 2: 07:08:56 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:56 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, 0xffffffffffffffff, 0x0) 07:08:56 executing program 5: 07:08:56 executing program 4: 07:08:56 executing program 4: 07:08:56 executing program 2: 07:08:56 executing program 5: 07:08:56 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, 0xffffffffffffffff, 0x0) 07:08:56 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:56 executing program 4: 07:08:57 executing program 5: 07:08:57 executing program 2: 07:08:57 executing program 4: 07:08:57 executing program 3: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) 07:08:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) 07:08:57 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:57 executing program 5: 07:08:57 executing program 4: 07:08:57 executing program 2: 07:08:57 executing program 3: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) 07:08:57 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:57 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80184132, &(0x7f0000000000)) 07:08:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xfdfdffff}) 07:08:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000340)={0x0, 0x0, 0x1}) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xfdfdffff}) dup(0xffffffffffffffff) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, 0x0) 07:08:57 executing program 3: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) 07:08:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/urandom\x00', 0x82, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0xee72) sendfile(r1, r2, &(0x7f0000000000), 0x8000fffffffe) 07:08:58 executing program 3: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) 07:08:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080), 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca0403b3c6da327afe21720024881def9fa15ec15bb0cb39374f19d63b357936a748e0bb2099ec2a79035bec4a89224cf37c93b534a5348ee94ba3f5f55fa92acaf8e0061598d802fcdc1f7253969a3278154696f42eaf07c89aacdfb016fcb0485a72fc2cdfd7d72f132ff82028a47b61d4dd4d1201d87bd883f74ac1710e05a8fe598dbd94c78adc2ad0e9ae6cb911691b61feaf07539d17c2b05a608dc1f71011c10c92f7faae952e304f0b6c94f754b11e416c4df32f5ca6c0caa6070ee04bfd47adf2f90843fc143b52d2ff50e63ea46a2677baf1df09e67c0768ee6382a8de5dc91eb5552dbd3ba7647b47efc8dc6c9de913710ad2314e3e94a2f9193c5fc3120474261c4914925707530c3a41ec98741aa30fabd70fc38cc57c6707bead0cf24b369f8989b366507b6a261842c727efa97032314f09626954d357374b42fee36fafd448fd0836bea7397b2ac03dff44372e987316fdacf8477befe768dc1505eb58bdb052a5eb3ab1a79014008c8ab55b3ea432beba4434f5199fc6f3b08934cc3fb4cc62b7a733826030153750fa61bbf0dbc1cdfef66ef77aa047c04b9ceb80ff0b99959fdeeaec0e3838dced78e9f12f997bcd992ef36baff4de252999d00406a379272912bab80fbecbd334eb4b844c66c0018312dc20ccb52f36dc84ba4c3876fe9f5b49f39e49e9348f38bcfb4a77a36790971c41c0ed554ebf03c145336e77bca86fcce945c43075d583233b2c36ff471d140ff8b4d91b33ad13540f5f2cffe0ced42839848a13cbc66f1d7393f01a8fe63b37619665d1c98bc1ae09fa9dcc642f2047a555bc8aab2ebfc00b13b902494b139ebe4b96026bf5c441b30b11611371386fac1ccf99df87093bd6609b24f7e7a1bfc175e720c7bb496c45d6f42acfacc216307f7f3bebb96f443e68717442b6ae5a9c29e10a5be02f30007653c9debdaa1e69c28d15d3bfd69232dfafae13622f4cbe9a030ae880375f7415d10770aae1c8271393546f40fa07e6e205de1f52ab215d7c2a1dc474d28e79081913f19c2c53fc8b8d86c699523e836a548c1315610ca4542b0ae145a1fac88d417252fdbec86b4d2d824ca2702102b18062a7194e2f96904dd210c1d2cbd12d253f4243324f61cbb42a0271527d7b871a1ddee9b55030a173ed9573a5cce7924946474c21e39bdddd559aa5f85e981d6ca79e967d5edb484ed6c70bf1d1c57f3ad64b5ede6ba51158d044578d395c561abd382335c5342883d6588d94fb860c0025adab4df23b2c9c00638fe33816b609267ad80e2b6b04d6b7872db753b3ed3dba724bec6c02d5a40cca99e074682f0fc6e0db69a265e5b2757dafd5db7d8a9d5f00b94e6afe662b180b750bedbbb3ba03c52bee15be40b259471fca2fd32696d241d6f9dea3beac4054146e334969e4dae0ef929a4b762bd44612353dbe8275ed21b3f34bf9b38d64e7cfbd8aebf826bd40eb2cb2331b410ca7753c40250954fa8ad12c09e7a54e18a645ad1e501d93e540c6560e702e80e360def60ccab4fd18bc3a33a9ef798aa77ccd30a0175e35b1d6df6963a489322b149d673d920695294f0e6267a4a078c4ab4b2e2cfefb7e81f45f6dd7207e2c8b7e57ac9d988856fa8c0c4c6e49be3c4f9dc7aa078f76268f0be9e2af88a0fe658b243ded33b3836d559a1fb480278f82e546eec2666def860686e9abb898d80f018edb937f7a902238194a16be357e91fd86eaab3c19ae9446a27810dfe586f2d354e251c4afdd89af87421f943d7b9e12b6640897459bd988ef31960784c8072184456fa99d33c3978a0dfc5dd88bfe941da4681d6e31894f5100b2e6fdbd75e51f2f32a0bc00976721b453c5c670b04ca27c23232be7734c35f2898512c3138c78d42626693084826d195299fdb4467db31c79761e40112d1e47d8fe1b846bec1dc7f92d59d088af95a7d4b0d10b7ece85bf6aef12693c429e3df8f7f27289857e16005a233ac1c526afcfa2d4a82ffdd0d52724b3a635e4415d7c0fbcacd1c24294919ad8bd6edc2dcc7e8c66f5980b8483d50a9f5b2204d2f9fbfccffd578dd718b342a1443be5e4f18fbc10691c678ec837ea9a37c8456dde7e3f420bd61e918270b83c3f5c3f9495b33c7be6ea81b78df808cdd55862beb2ad246bf402cbc90918f6d4ff0d24755c346cac9093a101f8ae9eb863139e012c73e10f4e09ae69f822f2bace32429dbbff181115c9eaf00deae55ac0c5c2563672947820b7d016d15049b9fe294a4613954832521727fbac1d900b441174140864c9c5d1fb58b2f0dbfbec0b62c4216a408b8b7f6c3aaaa8b3f153161173dc48daf0f2ddb3f30ac6e573430df30d6ea7259e460a19cf329c661dee097b871b351ffd22b8090df3dd9fdb22cb636f18eb4df69a63299ff3e2acf0d08a944e46907007be920a3672c215dc9fc8aa3066399d9b7494a8a2bc0416aec022389a52bb110ee99ce773132c61c04095c3d591dc273d7b91a99ec99911e7dfcc4b4522431d543ae1710ebfa4c0ac8c3b2af2827233d4b4edda49b98c7086e65b05930d2014cc44bb92217c9578282fdb9c2ce817eba860a14c8f9914353ca14f14d4baad9be49f03e91ecc42d199c3e3704d0476cbb01016326e351f6995e59287197cdc1b1a103a749b6d6a55bbc3cfdb9b8211653d55c46618fd1a0e4a2c755ab4c5d3503d4900648c6adc486ff1ea7e3228300ea161a32a55702de9115bb75928fff82d3761599792a359c3d04e738be8a16ecf1db16935bc2a6c54bd1c33f881b7f1ea687a06504667ec0f05c058392af51a4141123c6090f5ddb12845dc0a486d5f318f0efe1926b9bd5e3ae982e75f49225ee6b71899b7483b501466767a05320eebe3e94c54ec335a33eaa54ea97912a0cf844ad2edf59294af5f07ae3ffdeb7d6f03d10b7bb1616dce11ca2140ea859ddd2536602320eab4801360f821090a67562db436c0dd1209cc717bfe8fa9696ee917ca8985a0abc54b9f6f1b462e00b29b36a413e2fc784d153e95f2b7fc75b048c7aba3db76941b090e1fd76dddc8f6f2758c5e72cf101f0dc8185fb8f86fc4ec615312eb559954c2a32fb7add4699bc486c219744126c077a30f8402a03c95405f8a7981933ec1e9cf145fe8a0f0053794efacc1e8ad066841c87ff819ecf87c75e7e741faef1ade631bd2cb1572d00b341fc6306b56da50f53638e979f093fd789a28cd4cc320da4c43640a0394691f809fc0268d95e81773dfcae593f17f04864712eb47cedf4b0375399cef0982a78e1654085fb8a8704f27b1dfa5378919e4977aad38b5771c8f3402bb93a697abc7c21dd4374c4b74c1a923cdb3e532a4d2be5dd5897723f1ac3ec744b1ec87c324f93c9845456b72d7da990ec8a133864f247f5c9c88e9d3fc999b86c51d8a7d8c833dc5570b0d4339eabb0456f5b39e5216d8ee0be3465caf182d3373a50ba98b653c30b7986bed8687a005b14b344bd49cf487a96090565c35969d7e7c58af5199fe14eefe947cad9ef0fb6ab156438d5855c4bf03bb5095b72333bded3c35c5764c73abd73889d04e9904f44580726cd7491ba09840ecacac8f61e9711dcb5fd232ba71a586", 0x1000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r0, r1, 0x0, 0x10000) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) pselect6(0x40, &(0x7f0000000000)={0x9, 0x6, 0x0, 0x24c, 0x0, 0x5, 0x0, 0xffffffff}, 0x0, &(0x7f0000000180)={0x7, 0x1f, 0xfffffffffffffffa, 0x1000, 0x80000000, 0x0, 0x7, 0x6}, 0x0, &(0x7f0000000280)={&(0x7f0000000240), 0x8}) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) 07:08:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/urandom\x00', 0x82, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0xee72) sendfile(r1, r2, &(0x7f0000000000), 0x8000fffffffe) socket$inet6(0xa, 0x0, 0x0) 07:08:58 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000900)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") [ 262.964937] kauditd_printk_skb: 9 callbacks suppressed [ 262.964952] audit: type=1800 audit(1543820938.060:31): pid=7770 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor2" name="file0" dev="sda1" ino=16593 res=0 07:08:58 executing program 3: syz_open_dev$usb(0x0, 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) 07:08:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080), 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x1000) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r0, r1, 0x0, 0x10000) dup2(0xffffffffffffffff, r0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x9, 0x6, 0x0, 0x24c, 0x87, 0x5, 0x10001, 0xffffffff}, &(0x7f0000000040)={0x9, 0x101, 0x6, 0x2, 0x9, 0x6, 0x101, 0x1f}, 0x0, &(0x7f0000000200)={r2, r3+30000000}, &(0x7f0000000280)={&(0x7f0000000240)={0x9}, 0x8}) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, 0x0, 0xfffffffffffffffc) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) 07:08:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 263.100881] audit: type=1804 audit(1543820938.100:32): pid=7770 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir354056978/syzkaller.QUypZi/9/file0" dev="sda1" ino=16593 res=1 07:08:58 executing program 3: syz_open_dev$usb(0x0, 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) 07:08:58 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 263.277606] audit: type=1804 audit(1543820938.310:33): pid=7788 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir354056978/syzkaller.QUypZi/9/file0" dev="sda1" ino=16593 res=1 [ 263.319119] audit: type=1800 audit(1543820938.380:34): pid=7797 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=16520 res=0 07:08:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/urandom\x00', 0x82, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0xee72) sendfile(r1, r2, &(0x7f0000000000), 0x8000fffffffe) socket$inet6(0xa, 0x0, 0x0) [ 263.426524] audit: type=1804 audit(1543820938.400:35): pid=7797 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir900704506/syzkaller.GuzRq4/12/file0" dev="sda1" ino=16520 res=1 [ 263.494971] audit: type=1804 audit(1543820938.600:36): pid=7802 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir900704506/syzkaller.GuzRq4/12/file0" dev="sda1" ino=16520 res=1 [ 263.523639] audit: type=1804 audit(1543820938.630:37): pid=7770 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir354056978/syzkaller.QUypZi/9/file0" dev="sda1" ino=16593 res=1 07:08:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080), 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca0403b3c6da327afe21720024881def9fa15ec15bb0cb39374f19d63b357936a748e0bb2099ec2a79035bec4a89224cf37c93b534a5348ee94ba3f5f55fa92acaf8e0061598d802fcdc1f7253969a3278154696f42eaf07c89aacdfb016fcb0485a72fc2cdfd7d72f132ff82028a47b61d4dd4d1201d87bd883f74ac1710e05a8fe598dbd94c78adc2ad0e9ae6cb911691b61feaf07539d17c2b05a608dc1f71011c10c92f7faae952e304f0b6c94f754b11e416c4df32f5ca6c0caa6070ee04bfd47adf2f90843fc143b52d2ff50e63ea46a2677baf1df09e67c0768ee6382a8de5dc91eb5552dbd3ba7647b47efc8dc6c9de913710ad2314e3e94a2f9193c5fc3120474261c4914925707530c3a41ec98741aa30fabd70fc38cc57c6707bead0cf24b369f8989b366507b6a261842c727efa97032314f09626954d357374b42fee36fafd448fd0836bea7397b2ac03dff44372e987316fdacf8477befe768dc1505eb58bdb052a5eb3ab1a79014008c8ab55b3ea432beba4434f5199fc6f3b08934cc3fb4cc62b7a733826030153750fa61bbf0dbc1cdfef66ef77aa047c04b9ceb80ff0b99959fdeeaec0e3838dced78e9f12f997bcd992ef36baff4de252999d00406a379272912bab80fbecbd334eb4b844c66c0018312dc20ccb52f36dc84ba4c3876fe9f5b49f39e49e9348f38bcfb4a77a36790971c41c0ed554ebf03c145336e77bca86fcce945c43075d583233b2c36ff471d140ff8b4d91b33ad13540f5f2cffe0ced42839848a13cbc66f1d7393f01a8fe63b37619665d1c98bc1ae09fa9dcc642f2047a555bc8aab2ebfc00b13b902494b139ebe4b96026bf5c441b30b11611371386fac1ccf99df87093bd6609b24f7e7a1bfc175e720c7bb496c45d6f42acfacc216307f7f3bebb96f443e68717442b6ae5a9c29e10a5be02f30007653c9debdaa1e69c28d15d3bfd69232dfafae13622f4cbe9a030ae880375f7415d10770aae1c8271393546f40fa07e6e205de1f52ab215d7c2a1dc474d28e79081913f19c2c53fc8b8d86c699523e836a548c1315610ca4542b0ae145a1fac88d417252fdbec86b4d2d824ca2702102b18062a7194e2f96904dd210c1d2cbd12d253f4243324f61cbb42a0271527d7b871a1ddee9b55030a173ed9573a5cce7924946474c21e39bdddd559aa5f85e981d6ca79e967d5edb484ed6c70bf1d1c57f3ad64b5ede6ba51158d044578d395c561abd382335c5342883d6588d94fb860c0025adab4df23b2c9c00638fe33816b609267ad80e2b6b04d6b7872db753b3ed3dba724bec6c02d5a40cca99e074682f0fc6e0db69a265e5b2757dafd5db7d8a9d5f00b94e6afe662b180b750bedbbb3ba03c52bee15be40b259471fca2fd32696d241d6f9dea3beac4054146e334969e4dae0ef929a4b762bd44612353dbe8275ed21b3f34bf9b38d64e7cfbd8aebf826bd40eb2cb2331b410ca7753c40250954fa8ad12c09e7a54e18a645ad1e501d93e540c6560e702e80e360def60ccab4fd18bc3a33a9ef798aa77ccd30a0175e35b1d6df6963a489322b149d673d920695294f0e6267a4a078c4ab4b2e2cfefb7e81f45f6dd7207e2c8b7e57ac9d988856fa8c0c4c6e49be3c4f9dc7aa078f76268f0be9e2af88a0fe658b243ded33b3836d559a1fb480278f82e546eec2666def860686e9abb898d80f018edb937f7a902238194a16be357e91fd86eaab3c19ae9446a27810dfe586f2d354e251c4afdd89af87421f943d7b9e12b6640897459bd988ef31960784c8072184456fa99d33c3978a0dfc5dd88bfe941da4681d6e31894f5100b2e6fdbd75e51f2f32a0bc00976721b453c5c670b04ca27c23232be7734c35f2898512c3138c78d42626693084826d195299fdb4467db31c79761e40112d1e47d8fe1b846bec1dc7f92d59d088af95a7d4b0d10b7ece85bf6aef12693c429e3df8f7f27289857e16005a233ac1c526afcfa2d4a82ffdd0d52724b3a635e4415d7c0fbcacd1c24294919ad8bd6edc2dcc7e8c66f5980b8483d50a9f5b2204d2f9fbfccffd578dd718b342a1443be5e4f18fbc10691c678ec837ea9a37c8456dde7e3f420bd61e918270b83c3f5c3f9495b33c7be6ea81b78df808cdd55862beb2ad246bf402cbc90918f6d4ff0d24755c346cac9093a101f8ae9eb863139e012c73e10f4e09ae69f822f2bace32429dbbff181115c9eaf00deae55ac0c5c2563672947820b7d016d15049b9fe294a4613954832521727fbac1d900b441174140864c9c5d1fb58b2f0dbfbec0b62c4216a408b8b7f6c3aaaa8b3f153161173dc48daf0f2ddb3f30ac6e573430df30d6ea7259e460a19cf329c661dee097b871b351ffd22b8090df3dd9fdb22cb636f18eb4df69a63299ff3e2acf0d08a944e46907007be920a3672c215dc9fc8aa3066399d9b7494a8a2bc0416aec022389a52bb110ee99ce773132c61c04095c3d591dc273d7b91a99ec99911e7dfcc4b4522431d543ae1710ebfa4c0ac8c3b2af2827233d4b4edda49b98c7086e65b05930d2014cc44bb92217c9578282fdb9c2ce817eba860a14c8f9914353ca14f14d4baad9be49f03e91ecc42d199c3e3704d0476cbb01016326e351f6995e59287197cdc1b1a103a749b6d6a55bbc3cfdb9b8211653d55c46618fd1a0e4a2c755ab4c5d3503d4900648c6adc486ff1ea7e3228300ea161a32a55702de9115bb75928fff82d3761599792a359c3d04e738be8a16ecf1db16935bc2a6c54bd1c33f881b7f1ea687a06504667ec0f05c058392af51a4141123c6090f5ddb12845dc0a486d5f318f0efe1926b9bd5e3ae982e75f49225ee6b71899b7483b501466767a05320eebe3e94c54ec335a33eaa54ea97912a0cf844ad2edf59294af5f07ae3ffdeb7d6f03d10b7bb1616dce11ca2140ea859ddd2536602320eab4801360f821090a67562db436c0dd1209cc717bfe8fa9696ee917ca8985a0abc54b9f6f1b462e00b29b36a413e2fc784d153e95f2b7fc75b048c7aba3db76941b090e1fd76dddc8f6f2758c5e72cf101f0dc8185fb8f86fc4ec615312eb559954c2a32fb7add4699bc486c219744126c077a30f8402a03c95405f8a7981933ec1e9cf145fe8a0f0053794efacc1e8ad066841c87ff819ecf87c75e7e741faef1ade631bd2cb1572d00b341fc6306b56da50f53638e979f093fd789a28cd4cc320da4c43640a0394691f809fc0268d95e81773dfcae593f17f04864712eb47cedf4b0375399cef0982a78e1654085fb8a8704f27b1dfa5378919e4977aad38b5771c8f3402bb93a697abc7c21dd4374c4b74c1a923cdb3e532a4d2be5dd5897723f1ac3ec744b1ec87c324f93c9845456b72d7da990ec8a133864f247f5c9c88e9d3fc999b86c51d8a7d8c833dc5570b0d4339eabb0456f5b39e5216d8ee0be3465caf182d3373a50ba98b653c30b7986bed8687a005b14b344bd49cf487a96090565c35969d7e7c58af5199fe14eefe947cad9ef0fb6ab156438d5855c4bf03bb5095b72333bded3c35c5764c73abd73889d04e9904f44580726cd7491ba09840ecacac8f61e9711dcb5fd232ba71a586", 0x1000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r0, r1, 0x0, 0x10000) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) pselect6(0x40, &(0x7f0000000000)={0x9, 0x6, 0x0, 0x24c, 0x0, 0x5, 0x0, 0xffffffff}, 0x0, &(0x7f0000000180)={0x7, 0x1f, 0xfffffffffffffffa, 0x1000, 0x80000000, 0x0, 0x7, 0x6}, 0x0, &(0x7f0000000280)={&(0x7f0000000240), 0x8}) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) 07:08:58 executing program 3: syz_open_dev$usb(0x0, 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) 07:08:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:58 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 263.581014] audit: type=1804 audit(1543820938.630:38): pid=7783 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir354056978/syzkaller.QUypZi/9/file0" dev="sda1" ino=16593 res=1 [ 263.609774] syz-executor5 (7797) used greatest stack depth: 14120 bytes left [ 263.618590] syz-executor2 (7770) used greatest stack depth: 12072 bytes left 07:08:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080), 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x1000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r0, r1, 0x0, 0x10000) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) pselect6(0x40, &(0x7f0000000000)={0x9, 0x6, 0x0, 0x24c, 0x0, 0x5, 0x0, 0xffffffff}, 0x0, &(0x7f0000000180)={0x7, 0x1f, 0xfffffffffffffffa, 0x1000, 0x80000000, 0x0, 0x7, 0x6}, 0x0, &(0x7f0000000280)={&(0x7f0000000240), 0x8}) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) 07:08:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:58 executing program 3: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) 07:08:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 263.762464] audit: type=1800 audit(1543820938.860:39): pid=7835 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=16600 res=0 07:08:58 executing program 3: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) [ 263.850616] audit: type=1800 audit(1543820938.890:40): pid=7832 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor2" name="file0" dev="sda1" ino=16605 res=0 07:08:59 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 264.029779] syz-executor5 (7835) used greatest stack depth: 11624 bytes left 07:08:59 executing program 4: syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @link_local, [], {@ipv4={0x800, {{0xb, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0x18, 0x7, 0x3, 0x0, [{}, {}, {[@empty=0x2100]}, {}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 07:08:59 executing program 3: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) 07:08:59 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"00ac720000000000ec973f820f7c4000", 0x102}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 07:08:59 executing program 2: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={"62726964676530000000008000", &(0x7f0000000080)=ANY=[@ANYBLOB="10"]}) 07:08:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:59 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:59 executing program 3: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x10, r0, 0x0) 07:08:59 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000300)={0xc, 0x8, 0xfa00, {&(0x7f0000000440)}}, 0x1) 07:08:59 executing program 2: 07:08:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:59 executing program 3: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x10, r0, 0x0) 07:08:59 executing program 2: 07:08:59 executing program 4: 07:08:59 executing program 5: 07:08:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:59 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:59 executing program 2: 07:08:59 executing program 5: 07:08:59 executing program 4: 07:08:59 executing program 2: 07:08:59 executing program 3: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x10, r0, 0x0) 07:08:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:59 executing program 5: 07:08:59 executing program 4: 07:08:59 executing program 2: 07:08:59 executing program 5: 07:08:59 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:08:59 executing program 3: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, 0xffffffffffffffff, 0x0) 07:08:59 executing program 4: 07:09:00 executing program 5: 07:09:00 executing program 2: 07:09:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:00 executing program 3: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, 0xffffffffffffffff, 0x0) 07:09:00 executing program 4: 07:09:00 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:00 executing program 2: 07:09:00 executing program 5: 07:09:00 executing program 3: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, 0xffffffffffffffff, 0x0) 07:09:00 executing program 4: 07:09:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:00 executing program 5: 07:09:00 executing program 4: 07:09:00 executing program 2: 07:09:00 executing program 5: 07:09:00 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:00 executing program 3: 07:09:00 executing program 4: 07:09:00 executing program 2: 07:09:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:00 executing program 4: 07:09:00 executing program 3: 07:09:00 executing program 5: 07:09:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:00 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:00 executing program 2: 07:09:00 executing program 4: 07:09:00 executing program 5: 07:09:00 executing program 3: 07:09:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:00 executing program 2: 07:09:00 executing program 4: 07:09:00 executing program 5: 07:09:00 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) lsetxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 07:09:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:00 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x8000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x9, 0x1}) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x20007ffc) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)={{0x0, 0x2}, {0x6, 0x80}}) 07:09:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) 07:09:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:01 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000400)=@filename='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x11000, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x5890, 0x0) 07:09:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/urandom\x00', 0x82, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0xee72) sendfile(r1, r2, &(0x7f0000000000), 0x8000fffffffe) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) futex(&(0x7f000000cffc), 0x800000000006, 0x0, 0x0, &(0x7f0000048000), 0x0) shutdown(0xffffffffffffffff, 0x1) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x7) socket$inet6(0xa, 0x0, 0x20000000004) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:09:01 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/urandom\x00', 0x82, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0xee72) sendfile(r1, r2, &(0x7f0000000000), 0x8000fffffffe) sched_setscheduler(0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, &(0x7f0000048000), 0x0) shutdown(0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x7) socket$inet6(0xa, 0x3fffffffffff, 0x20000000004) fstat(0xffffffffffffffff, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x1000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev}}, 0x1c) 07:09:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:01 executing program 5: io_setup(0x1, &(0x7f00000002c0)=0x0) r1 = socket(0x2, 0x803, 0xff) io_submit(r0, 0x1, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 07:09:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) syslog(0x2, &(0x7f00000001c0)=""/89, 0xd4) socket$nl_generic(0x10, 0x3, 0x10) 07:09:01 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:01 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x8000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x9, 0x1}) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x20007ffc) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)={{0x0, 0x2}, {0x6, 0x80}}) 07:09:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000b4e000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x30f}], 0x5, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) close(r0) 07:09:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x9, 0x0, 0x0, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e20}]}, 0x1c}}, 0x0) 07:09:01 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:02 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000300)=""/132, 0x84}, {0x0}, {&(0x7f0000001740)=""/155, 0x9b}, {0x0}], 0x4, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)=""/92, 0x174}, {&(0x7f0000000080)=""/7, 0x7}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000015c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)=""/34, 0x22}], 0x1}}], 0x1, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000") ustat(0x0, 0x0) mkdir(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$TIOCNOTTY(r1, 0x5422) ioctl(r0, 0xc2604110, &(0x7f0000000000)) [ 266.848423] netlink: 'syz-executor5': attribute type 1 has an invalid length. [ 266.868451] netlink: 'syz-executor5': attribute type 1 has an invalid length. 07:09:02 executing program 3: r0 = socket$inet6(0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000340), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)) mkdir(&(0x7f0000000140)='./file0\x00', 0x40) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, 0x0) mount$fuseblk(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="aaaaaaaaaa50450004fcfe0ceb2da6870c8ae265f6bfd8766c81a38bb68c7ba01ad5cf993b98a07852364a97d68dd163d3000000001449900bee3d6ba3d7b597314d9b50652195fdee3574dcccb34ea3cf251c720130f970c2d1352fb84c5438c4dc22ada32df76dcab9722e337a0ec69bb5a4ad6eb75745b3b48dc624793798"], 0x0) socket(0x1e, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0), 0x2}}, 0x20) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000003c0)={0x0, 0x5}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r2 = socket(0x40000000015, 0x5, 0x0) mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) bind$inet(r2, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 07:09:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) 07:09:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:02 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x8000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x9, 0x1}) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x20007ffc) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)={{0x0, 0x2}, {0x6, 0x80}}) 07:09:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 267.304410] Filesystem requires source device 07:09:02 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000300)=""/132, 0x84}, {0x0}, {&(0x7f0000001740)=""/155, 0x9b}, {0x0}], 0x4, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)=""/92, 0x174}, {&(0x7f0000000080)=""/7, 0x7}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000015c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)=""/34, 0x22}], 0x1}}], 0x1, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000") ustat(0x0, 0x0) mkdir(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$TIOCNOTTY(r1, 0x5422) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 07:09:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 267.390790] Filesystem requires source device 07:09:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:02 executing program 3: r0 = socket$inet6(0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000340), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)) mkdir(&(0x7f0000000140)='./file0\x00', 0x40) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, 0x0) mount$fuseblk(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="aaaaaaaaaa50450004fcfe0ceb2da6870c8ae265f6bfd8766c81a38bb68c7ba01ad5cf993b98a07852364a97d68dd163d3000000001449900bee3d6ba3d7b597314d9b50652195fdee3574dcccb34ea3cf251c720130f970c2d1352fb84c5438c4dc22ada32df76dcab9722e337a0ec69bb5a4ad6eb75745b3b48dc624793798"], 0x0) socket(0x1e, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0), 0x2}}, 0x20) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000003c0)={0x0, 0x5}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r2 = socket(0x40000000015, 0x5, 0x0) mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) bind$inet(r2, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 07:09:02 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200007c0], 0x2, 0x0, &(0x7f00000007c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bc\x00', "73010030000002000000ffff00", 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "2ce719c99cffcbf4d7e80e410bb5007c6981466b6431c7e6b129fcead3f149b589996102627779dc3b23bf8250fc3acd9e8be08a4bbab9be219f504cae3a7e4d"}}}}]}, {0x0, '\x00', 0x1, 0xfffffdfffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1f0) 07:09:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 267.710443] ebtables: ebtables: counters copy to user failed while replacing table 07:09:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:03 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x2003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f000000a000)=[{&(0x7f000000a000)=@abs, 0x6e, 0x0}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000400)=0x4, 0x4) socket(0x0, 0x0, 0x0) [ 267.869037] ebtables: ebtables: counters copy to user failed while replacing table [ 267.901859] Filesystem requires source device 07:09:03 executing program 4: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0xfe1c) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c344ee9dc01497f542f542b0796e0266420fe2e33edb11aa6114f241d1e7d3196f") futex(&(0x7f0000000540), 0x0, 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x0, 0x0) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, 0x0, 0x0) 07:09:03 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000300)=""/132, 0x84}, {0x0}, {&(0x7f0000001740)=""/155, 0x9b}, {0x0}], 0x4, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)=""/92, 0x174}, {&(0x7f0000000080)=""/7, 0x7}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000015c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)=""/34, 0x22}], 0x1}}], 0x1, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000") ustat(0x0, 0x0) mkdir(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$TIOCNOTTY(r1, 0x5422) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 07:09:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x20a}}, 0x20}}, 0x0) 07:09:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000280)={0x0, 0x8000}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000003000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:09:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:03 executing program 2: 07:09:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:04 executing program 4: 07:09:04 executing program 2: 07:09:04 executing program 5: 07:09:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:04 executing program 3: 07:09:04 executing program 2: 07:09:04 executing program 5: 07:09:04 executing program 3: 07:09:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:04 executing program 4: 07:09:04 executing program 2: 07:09:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(0x0, 0x0) 07:09:04 executing program 3: 07:09:04 executing program 5: 07:09:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:04 executing program 2: 07:09:04 executing program 4: 07:09:04 executing program 5: 07:09:04 executing program 3: 07:09:04 executing program 2: 07:09:04 executing program 3: 07:09:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:04 executing program 4: 07:09:05 executing program 3: 07:09:05 executing program 5: 07:09:05 executing program 2: 07:09:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:05 executing program 4: 07:09:05 executing program 3: 07:09:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f}, 0x20}}, 0x0) 07:09:05 executing program 0: 07:09:05 executing program 5: 07:09:05 executing program 2: 07:09:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:05 executing program 5: 07:09:05 executing program 0: 07:09:05 executing program 4: 07:09:05 executing program 2: 07:09:05 executing program 3: 07:09:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:05 executing program 0: 07:09:05 executing program 5: 07:09:05 executing program 2: 07:09:05 executing program 4: 07:09:05 executing program 3: 07:09:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x10f, 0x0, &(0x7f00000004c0), 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000001580)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x1}, 0x20) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socket$inet6(0xa, 0x807, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000100)) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x7, 0x5, 0xb3c, 0x4c, 0x0, 0x7fffffff, 0x0, 0x101, 0x7, 0x0, 0x6, 0x0, 0x101}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000002640)={"87899eac51f2f0d1ca7bce548088a673a10b4a5c2516dcf304939a383dc0f75adce1d563bcca4f88f07c5a0d276877b3525fb8847e49fdf94b1bdb997812b497fc262e9d82bfd0b909ee1140626550e3155e81f1dc5b762e97e1a8fd30a0b97c723e4a49863d7c452c81ba23daf0521640db3ae7b67f0b4dad577e69dd4e02244872a3f6c4b3f887da0152792997708e2ef266688b472e4f9c0e2f3eab01202db13e82a91c56c726912bad77995c7a1e58139104de5c0c2044edd3b4c06dda95403dde49b01b552ef69a5d7cf97178de24b5bdc08fcfa4025308caa60e1abdb2f0da73a325f78660a4a4211eda958cb95793e63081699325edfa749bfc6ba036105e83b11a50768e0b2e1afbb4d36c10a3648e53432a3913b74d9d5f47bc7b7864f50aa4f7a95bc1c567833cfded96e70fab6bf1ebc78c7afbff2f2508d98981207b07347dbf1f965d2202ed047f05ec7276c75281176e9a156b3681b3f546538ac8044b229852087fefdc4faf5d750c6665205687472e158308cd193d0d5fbcc6a97ac892b631819a165d41e593d25f66a94b989e1b8b070b5b15e34c4470d205edca2d3afce53b83ffdcd49b881a42625e019cb09affda57d4da7d0886132c1a04a0837825570a0cb45eb2ed7f7d5cb87b21955fc5bba8e2393fa856ea41c022266473453a5677fe4d389ba289ce014a5aaeab6279a9f10692835cf02081d791ae41fb47d143ffda4c735f55e1cb4f140c5c085d8cac24acdebd6f0ba457a801ac099ac0b406efe48d420853dd8842eba6242577573f83d580321577597b848c2509179284f595065c2ec788ed11f79d32b21467aa010dbd01a85ed452438c761023184572e93915e3c0b6095a69e85ed4252a62ff8c579c1927190fa7b751ed3cc8dc21d6d01f91de16f482b5c1b11c7e2df9118faf7d9c76afd6539a2ace869446ce586fd595f61c9b77499c28853187dfa688b02a7c1d2cfc0d7554058c80ada888da2ce02b5c11f7b56e5a9c530755ec5702847304618b1e3c01efa3c6cf5b72e649574d95aa34b26840c6796fb2898ff0bb738af3852d8be39dc3b67f3fcc04cb0129a03a1db40a1db86b3ed9eb22b31f5753f287edad0033cd2f770c8cf3550c23b3baa3be0a5ab7e184837c5dbe6d996964b75af8ae345122108f781c5f4a4a1cfeb8e428f69e0dab0313d21872568b8125a9e38f7af72b332824225521e4cc64dd380d3cd8fc5c314162e6f1046366437e85a187b342087384d2cddd69791cd4bec151be1f562407a58fc7fd592db4a4ad51cc1ec1041ecd0b36e12d24b3abb830260d9f9f64b45559879c454ee7c8e6c70aea012c9d4f6d90efb24e35d3023fdab8aa6bf97bac6bea616cf1a1042fd0094264342a2b35c3cd1762fc811d7f0e34050d1abfcc04cfd34e096f1af41002d55f58f1bf18feadb0997f"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffffffffffffffff, 0x100) 07:09:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 07:09:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000a8d000)={0x0, 0x0, &(0x7f0000df6000)={&(0x7f0000b04cf4)={0x14, 0x15, 0xa, 0xfffffffffffffffd}, 0x14}}, 0x0) 07:09:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setgid(r1) 07:09:05 executing program 3: 07:09:05 executing program 4: 07:09:05 executing program 3: 07:09:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:05 executing program 2: 07:09:05 executing program 4: 07:09:05 executing program 2: 07:09:06 executing program 0: 07:09:06 executing program 3: 07:09:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:06 executing program 4: 07:09:06 executing program 2: 07:09:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x10f, 0x0, &(0x7f00000004c0), 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000001580)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x1}, 0x20) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socket$inet6(0xa, 0x807, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000100)) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x7, 0x5, 0xb3c, 0x4c, 0x0, 0x7fffffff, 0x0, 0x101, 0x7, 0x0, 0x6, 0x0, 0x101}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000002640)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffffffffffffffff, 0x100) 07:09:06 executing program 2: 07:09:06 executing program 3: 07:09:06 executing program 4: 07:09:06 executing program 0: 07:09:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:06 executing program 2: 07:09:06 executing program 4: 07:09:06 executing program 3: 07:09:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:06 executing program 0: 07:09:06 executing program 2: 07:09:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) unshare(0x200) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) setns(r0, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x80000, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) 07:09:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x0) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) 07:09:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:07 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:07 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup2(r1, 0xffffffffffffffff) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)) futex(&(0x7f000000cffc), 0x800000000006, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, 0x0) pipe(0x0) syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 07:09:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) futex(0x0, 0x800000000006, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000140)) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) 07:09:07 executing program 5 (fault-call:6 fault-nth:0): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:07 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 272.103383] IPVS: ftp: loaded support on port[0] = 21 [ 272.143933] FAULT_INJECTION: forcing a failure. [ 272.143933] name failslab, interval 1, probability 0, space 0, times 1 [ 272.188463] CPU: 0 PID: 8437 Comm: syz-executor5 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 272.196982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.197064] Call Trace: [ 272.197161] dump_stack+0x244/0x39d [ 272.197187] ? dump_stack_print_info.cold.1+0x20/0x20 [ 272.197255] should_fail.cold.4+0xa/0x17 [ 272.197293] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.197372] ? find_held_lock+0x36/0x1c0 [ 272.231474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.231512] ? _parse_integer+0x134/0x180 [ 272.231530] ? graph_lock+0x270/0x270 [ 272.231549] ? find_held_lock+0x36/0x1c0 [ 272.241272] ? con_do_clear_unimap.isra.2+0x278/0x2f0 [ 272.241341] ? perf_trace_sched_process_exec+0x860/0x860 [ 272.241360] ? lock_downgrade+0x900/0x900 [ 272.249236] __should_failslab+0x124/0x180 [ 272.249293] should_failslab+0x9/0x14 [ 272.249338] kmem_cache_alloc+0x2be/0x730 [ 272.259998] ? cap_capable+0x1f9/0x260 [ 272.260045] getname_flags+0xd0/0x590 [ 272.260066] user_path_mountpoint_at+0x27/0x40 07:09:07 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 272.260096] ksys_umount+0x1c5/0x1260 [ 272.268459] ? kasan_check_write+0x14/0x20 [ 272.268490] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 272.268509] ? __detach_mounts+0x430/0x430 [ 272.268526] ? wait_for_completion+0x8a0/0x8a0 [ 272.268547] ? __lock_is_held+0xb5/0x140 [ 272.268569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.268588] ? check_preemption_disabled+0x48/0x280 [ 272.276568] ? __sb_end_write+0xd9/0x110 [ 272.276591] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 272.276607] ? fput+0x130/0x1a0 [ 272.276651] ? do_syscall_64+0x9a/0x820 [ 272.276670] ? do_syscall_64+0x9a/0x820 [ 272.284362] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 272.284433] ? trace_hardirqs_on+0xbd/0x310 [ 272.284449] ? __ia32_sys_read+0xb0/0xb0 [ 272.284495] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.284514] ? trace_hardirqs_off_caller+0x300/0x300 [ 272.284553] __x64_sys_umount+0x54/0x80 [ 272.292934] do_syscall_64+0x1b9/0x820 [ 272.292953] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.292979] ? syscall_return_slowpath+0x5e0/0x5e0 07:09:07 executing program 2 (fault-call:2 fault-nth:0): syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) [ 272.292999] ? trace_hardirqs_on_caller+0x310/0x310 [ 272.293018] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 272.293086] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 272.293107] ? __switch_to_asm+0x40/0x70 [ 272.302276] ? __switch_to_asm+0x34/0x70 [ 272.302298] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.302323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.302336] RIP: 0033:0x457569 [ 272.302353] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.302362] RSP: 002b:00007f67b2625c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 272.302377] RAX: ffffffffffffffda RBX: 00007f67b2625c90 RCX: 0000000000457569 [ 272.302386] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 272.302395] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 272.302404] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f67b26266d4 [ 272.302413] R13: 00000000004c56c8 R14: 00000000004d9670 R15: 0000000000000005 [ 272.417007] FAULT_INJECTION: forcing a failure. [ 272.417007] name failslab, interval 1, probability 0, space 0, times 1 [ 272.464330] CPU: 1 PID: 8445 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 272.511182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.520535] Call Trace: [ 272.523129] dump_stack+0x244/0x39d [ 272.526766] ? dump_stack_print_info.cold.1+0x20/0x20 [ 272.531975] should_fail.cold.4+0xa/0x17 [ 272.536043] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.541176] ? graph_lock+0x270/0x270 [ 272.545331] ? graph_lock+0x270/0x270 [ 272.549198] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 272.554421] ? find_held_lock+0x36/0x1c0 [ 272.558514] ? __lock_is_held+0xb5/0x140 [ 272.562607] ? leak_balloon+0x858/0xaa0 [ 272.566603] ? perf_trace_sched_process_exec+0x860/0x860 [ 272.572059] ? kasan_check_read+0x11/0x20 [ 272.576227] ? finish_task_switch+0x1f4/0x920 [ 272.580738] __should_failslab+0x124/0x180 [ 272.584984] should_failslab+0x9/0x14 [ 272.588809] kmem_cache_alloc+0x2be/0x730 [ 272.592964] ? finish_task_switch+0x1f4/0x920 [ 272.597472] ? finish_task_switch+0x1b4/0x920 [ 272.601971] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 272.607550] ? may_expand_vm+0x1e3/0x810 [ 272.611653] vm_area_dup+0x7a/0x230 [ 272.615284] ? vm_area_alloc+0x1d0/0x1d0 [ 272.619379] ? print_usage_bug+0xc0/0xc0 [ 272.623447] ? __switch_to_asm+0x40/0x70 [ 272.627515] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 272.632537] __split_vma+0xae/0x570 [ 272.636173] ? find_vma+0x34/0x190 [ 272.639738] __do_munmap+0xd14/0xf80 [ 272.643452] ? __sched_text_start+0x8/0x8 [ 272.647619] mmap_region+0x6a7/0x1cd0 [ 272.651422] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 272.656025] ? __x64_sys_brk+0x8b0/0x8b0 [ 272.660101] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 272.664906] ? mpx_unmapped_area_check+0xd8/0x108 [ 272.669795] ? arch_get_unmapped_area_topdown+0xc2/0x940 [ 272.675254] ? arch_get_unmapped_area+0x750/0x750 [ 272.680099] ? lock_acquire+0x268/0x520 [ 272.684077] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 272.689094] ? cap_mmap_addr+0x52/0x130 [ 272.693077] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.698643] ? security_mmap_addr+0x80/0xa0 [ 272.703041] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 272.708584] ? get_unmapped_area+0x292/0x3b0 [ 272.712998] do_mmap+0xa22/0x1230 [ 272.716468] ? mmap_region+0x1cd0/0x1cd0 [ 272.720531] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 272.724592] ? down_read_killable+0x150/0x150 [ 272.729094] ? security_mmap_file+0x174/0x1b0 [ 272.733608] vm_mmap_pgoff+0x213/0x2c0 [ 272.737511] ? vma_is_stack_for_current+0xd0/0xd0 [ 272.742360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.747916] ? check_preemption_disabled+0x48/0x280 [ 272.752949] ksys_mmap_pgoff+0x4da/0x660 [ 272.757025] ? do_syscall_64+0x9a/0x820 [ 272.761001] ? find_mergeable_anon_vma+0xd0/0xd0 [ 272.765758] ? trace_hardirqs_on+0xbd/0x310 [ 272.770089] ? __ia32_sys_read+0xb0/0xb0 [ 272.774154] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.779534] ? trace_hardirqs_off_caller+0x300/0x300 [ 272.784691] __x64_sys_mmap+0xe9/0x1b0 [ 272.788597] do_syscall_64+0x1b9/0x820 [ 272.792495] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.797907] ? syscall_return_slowpath+0x5e0/0x5e0 [ 272.802838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.807673] ? trace_hardirqs_on_caller+0x310/0x310 [ 272.812730] ? prepare_exit_to_usermode+0x291/0x3b0 [ 272.817758] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.822615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.827809] RIP: 0033:0x457569 [ 272.831005] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.849907] RSP: 002b:00007ff7a7b8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 272.857616] RAX: ffffffffffffffda RBX: 00007ff7a7b8ec90 RCX: 0000000000457569 [ 272.864884] RDX: 0000000000000000 RSI: 0000000000507000 RDI: 0000000020000000 [ 272.872150] RBP: 000000000072bf00 R08: 0000000000000004 R09: 0000000000000000 [ 272.879421] R10: 4000000000020011 R11: 0000000000000246 R12: 00007ff7a7b8f6d4 07:09:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 272.886688] R13: 00000000004c2b5d R14: 00000000004d4828 R15: 0000000000000005 07:09:08 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 272.940220] IPVS: ftp: loaded support on port[0] = 21 07:09:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f1ff22"], 0x3) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x400, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r3, 0x11, 0x1, &(0x7f0000000140)=""/76, &(0x7f00000001c0)=0x4c) ioctl$KVM_RUN(r2, 0xae80, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x7fff, 0x4, 0x6, 0x9, 0x8000, 0x3, 0x3f, 0x0, 0x228, 0x38, 0x257, 0x1ff, 0x1, 0x20, 0x2, 0x13a0, 0x320, 0x1}, [{0x6474e551, 0xfffffffffffffffc, 0x5d, 0xebc, 0x8, 0x3, 0xab0, 0xfe}], "f66f8bee3db805220156b78713707d5378b11f46f1d9e2e5e68afd20cc707ace9dfe580d75cf8aa79738f2a39ef28948ef039ebadc96f8739efa04e7a82a34bcea2e3282944bb0c84e1b40d261b58df6e787aa079fbd521bd0a00009e7aef1667af7a7cde48e66ffc617e6738ee9adcdcd8233e003070a096ab8ee4dd3c769d261427b0ee6cb65883b3cb84a42918a5d43753860db7f5b929b2148991fd21b9d7df1da97421330f495a739342192b9a05bc9f621d0ab20f3f8c5dd9d74749b05e9758d77d297dbe8b6ef47c88442a2f5b4547efbfdce772f5f0e99fe8921f854655b437cf831db951fea2ca1228b2f581705", [[], []]}, 0x34a) 07:09:09 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000900)={0x2, 0x0, @multicast2}, &(0x7f0000000e00)=0x10, 0x800) ioctl(r0, 0x4, &(0x7f0000001200)="0a5cc84267bd19a8b40a08d5bdfaff55436b0fca2fb3b088626ff34f4b3dfc7281f3a8267ad879e6879211ec8dcd5a9bdc94f809d9d225bc4696cf162a09f785b2e1142cb71c7a50794d55fbad2b0be3338f63f904d7f68374ffc999937745c6848df5783f74bb99dc67ea819afa1aabb71639e752ae58dd59403cd0d9a1ca7e0b85537d4c391796b9af70b1618b647e59d0c1b4493543f0321828bb57f9a628c236d6c88f538d") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x100000000) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000002, 0x68002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000340)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) sendmsg$alg(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="1d49e3685d9d8c35ef739167997b26a4e592951f4b7cda362f8ab99067dc40beba7bde6918fc85e1d97ea326fa609a6518419a8d06c6a48a037e59aac27c887195b6c60bcf080007ed4cb0a9e960be8789984af9131c125c7b10792bcb367088a314a55b2d7b91c75afe0a8e6b8721bf02003f7b5c0354d1332d7df10e33d782771860b36d663a479041899d970b7bf2153552a85b33d11fa5bc59e758a55c947a9b2054a5571a8704c88695983c82ee637eef16651791539d098a6a73b19727c9e9dd265da7752174c3f2ac9ffb2bc2fd6bcb192e496bc9d9355193de2288", 0xdf}], 0x1, &(0x7f0000001000), 0x0, 0x8000}, 0x20000000) epoll_create(0x1) timer_create(0x5, &(0x7f0000000d40)={0x0, 0x23, 0x2, @thr={&(0x7f0000000880)="f4333d1da5e4383802659ab6f5e12e7986c2dfc68b0f50eda5415f748f363988a831584a41dfa196b05037c8338bc9ca0ef19700483e714b991b8ef6a20845491d019069c20eec35f70173741e76b16f6f7d61a1520d24d755", &(0x7f0000000800)="74620be6a296f204f112df6d19125909c47e8ac91f7533af7ba0a38c9bb8890da316f317c42cced21487d83701d3d2b9e1"}}, &(0x7f0000000d80)=0x0) timer_gettime(r3, &(0x7f0000000dc0)) write$FUSE_POLL(r1, &(0x7f00000000c0)={0xfffffe51, 0x1, 0xfffffffffffffffe, {0x400}}, 0x18) pwrite64(r1, &(0x7f0000000540)="3f277f944ddeecfc55cbf59cc689972f88165ff974e5e054146317729bab5525e315f204dce1933f10dca767929994eb25c8f5181c0b1c04b1b268595345aa51a77d8af130f955f9841bf8b09618207b0d8b8eed2c5efbd2397432bffd8b7036da4854ea202609e74f6db413eb9c6f13e9c774b1dd4ff18e7a5a904cdc97d44a5be832c041c3659ea4972b5adb5f98b72e925bd0dde42751fb4c4b329ec340b03a1a7e93110686c14210c166ca70f2804e103be29b5e59ce2afe5adc8c378a3308aa3d14d3770484c77e93abcc1fce5409d6c533f64798c5b4", 0xd9, 0x0) r4 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0xe78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200007c0], 0x0, &(0x7f0000000080), &(0x7f00000007c0)=ANY=[@ANYBLOB="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"]}, 0xeef) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r5 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r5, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r5, &(0x7f0000000100)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) inotify_init() mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"]) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000940)={"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"}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000500)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) 07:09:09 executing program 2 (fault-call:2 fault-nth:1): syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) 07:09:09 executing program 3: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000002c0)={0x0, 0x0}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x10000, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x400, 0x5, 0x944c, 0x495747f7, 0x0, 0x4, 0x81000, 0x1, 0x1, 0xff, 0x1ab2, 0x3, 0x100000000, 0x4, 0xcbd, 0x7, 0x1000, 0x33, 0x364, 0x3, 0x7, 0x0, 0x5, 0x1, 0x5, 0x3950, 0x8001, 0x800, 0x2, 0x1f25aa4f, 0x0, 0x1ff, 0xa8d9, 0x0, 0x4, 0x9, 0x0, 0x10100, 0x0, @perf_config_ext={0x5, 0x6}, 0x82, 0x6, 0x5, 0x6, 0x5, 0xf39, 0xff}, r0, 0xa, r1, 0x2) r2 = dup(0xffffffffffffffff) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000040)="b3f7bd59b6bebde0106919a789241e25bbe5495623112c4eef19f6be786844b4431b007f85f01abd78f9ccdd36c8a0c9928d7187a2de5b2b48430d7c32dd3b13ade99769d8152f671ef798438d7f0f4346fdc988a9b926ce7f9bfda35cc8723645b6be1baba5ac5f68ecda6a410a8ebc6baa58a841cebad085050d5446a17611df3a665faee8e6b4e7316a121a32b946769991bf439a1695a4b467e687aabbc571d96b4e858f8fb079d6c5d3d67f8bfd36025775d9f5ff558b27a86f35c65361543d7fb671f5760e7d034b83aa43eb6ed62f5b901fe233b168dfe4") ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000180), &(0x7f00000001c0)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x1, r5, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, r5, 0x0) dup3(r3, r6, 0x0) 07:09:09 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:09 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0xf5ffffff) [ 274.781153] FAULT_INJECTION: forcing a failure. [ 274.781153] name failslab, interval 1, probability 0, space 0, times 0 07:09:09 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 274.846429] kernel msg: ebtables bug: please report to author: Wrong len argument [ 274.859161] CPU: 1 PID: 8465 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 274.867677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.877046] Call Trace: [ 274.877073] dump_stack+0x244/0x39d [ 274.877099] ? dump_stack_print_info.cold.1+0x20/0x20 [ 274.877185] ? is_bpf_text_address+0xd3/0x170 [ 274.877215] should_fail.cold.4+0xa/0x17 [ 274.897136] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.902268] ? save_stack+0xa9/0xd0 [ 274.905911] ? save_stack+0x43/0xd0 [ 274.909558] ? kasan_kmalloc+0xc7/0xe0 [ 274.913460] ? kasan_slab_alloc+0x12/0x20 [ 274.917634] ? kmem_cache_alloc+0x12e/0x730 [ 274.921973] ? vm_area_dup+0x7a/0x230 [ 274.925790] ? __split_vma+0xae/0x570 [ 274.929603] ? __do_munmap+0xd14/0xf80 [ 274.933504] ? mmap_region+0x6a7/0x1cd0 [ 274.937490] ? do_mmap+0xa22/0x1230 [ 274.941637] ? vm_mmap_pgoff+0x213/0x2c0 [ 274.941656] ? ksys_mmap_pgoff+0x4da/0x660 [ 274.941673] ? __x64_sys_mmap+0xe9/0x1b0 [ 274.941690] ? do_syscall_64+0x1b9/0x820 [ 274.941725] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.963599] ? percpu_ref_put_many+0x11c/0x260 [ 274.968196] ? lock_downgrade+0x900/0x900 [ 274.968215] ? check_preemption_disabled+0x48/0x280 [ 274.968237] ? kasan_check_read+0x11/0x20 [ 274.968257] ? graph_lock+0x270/0x270 [ 274.985387] ? rcu_softirq_qs+0x20/0x20 [ 274.989404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.994946] ? check_preemption_disabled+0x48/0x280 [ 274.999981] __should_failslab+0x124/0x180 [ 275.004231] should_failslab+0x9/0x14 [ 275.008034] kmem_cache_alloc+0x47/0x730 [ 275.012151] ? rcu_read_lock_sched_held+0x14f/0x180 [ 275.017207] anon_vma_clone+0x140/0x710 [ 275.021199] ? unlink_anon_vmas+0xa60/0xa60 [ 275.025549] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 275.030587] __split_vma+0x183/0x570 [ 275.034309] ? find_vma+0x34/0x190 [ 275.037857] __do_munmap+0xd14/0xf80 [ 275.041586] mmap_region+0x6a7/0x1cd0 [ 275.045405] ? __x64_sys_brk+0x8b0/0x8b0 [ 275.049475] ? graph_lock+0x270/0x270 [ 275.053283] ? graph_lock+0x270/0x270 [ 275.057135] ? get_pid_task+0xd6/0x1a0 [ 275.061035] ? mpx_unmapped_area_check+0xd8/0x108 [ 275.065890] ? arch_get_unmapped_area_topdown+0xc2/0x940 [ 275.071350] ? arch_get_unmapped_area+0x750/0x750 [ 275.076212] ? lock_acquire+0x1ed/0x520 [ 275.080196] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 275.085249] ? cap_mmap_addr+0x52/0x130 [ 275.089229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.094772] ? security_mmap_addr+0x80/0xa0 [ 275.099098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.104641] ? get_unmapped_area+0x292/0x3b0 [ 275.109063] do_mmap+0xa22/0x1230 [ 275.112558] ? mmap_region+0x1cd0/0x1cd0 [ 275.116624] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 275.120689] ? down_read_killable+0x150/0x150 [ 275.125200] ? security_mmap_file+0x174/0x1b0 [ 275.129717] vm_mmap_pgoff+0x213/0x2c0 [ 275.133654] ? vma_is_stack_for_current+0xd0/0xd0 [ 275.138511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.144055] ? check_preemption_disabled+0x48/0x280 [ 275.149109] ksys_mmap_pgoff+0x4da/0x660 [ 275.153189] ? do_syscall_64+0x9a/0x820 [ 275.157185] ? find_mergeable_anon_vma+0xd0/0xd0 [ 275.161952] ? trace_hardirqs_on+0xbd/0x310 [ 275.166294] ? __ia32_sys_read+0xb0/0xb0 [ 275.170360] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.175742] ? trace_hardirqs_off_caller+0x300/0x300 [ 275.180864] __x64_sys_mmap+0xe9/0x1b0 [ 275.184767] do_syscall_64+0x1b9/0x820 [ 275.188664] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.194033] ? syscall_return_slowpath+0x5e0/0x5e0 [ 275.198964] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.203846] ? trace_hardirqs_on_caller+0x310/0x310 [ 275.208886] ? prepare_exit_to_usermode+0x291/0x3b0 [ 275.213912] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.218770] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.223963] RIP: 0033:0x457569 [ 275.227169] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.246070] RSP: 002b:00007ff7a7b8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 275.253780] RAX: ffffffffffffffda RBX: 00007ff7a7b8ec90 RCX: 0000000000457569 [ 275.261064] RDX: 0000000000000000 RSI: 0000000000507000 RDI: 0000000020000000 [ 275.268333] RBP: 000000000072bf00 R08: 0000000000000004 R09: 0000000000000000 [ 275.275601] R10: 4000000000020011 R11: 0000000000000246 R12: 00007ff7a7b8f6d4 [ 275.282869] R13: 00000000004c2b5d R14: 00000000004d4828 R15: 0000000000000005 07:09:10 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 275.330259] kernel msg: ebtables bug: please report to author: Wrong len argument 07:09:10 executing program 2 (fault-call:2 fault-nth:2): syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) 07:09:10 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_G_PRIORITY(r1, 0xc0285628, 0x707000) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U+', 0x30c}, 0x28, 0x1) [ 275.470007] FAULT_INJECTION: forcing a failure. [ 275.470007] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 275.481856] CPU: 0 PID: 8494 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 275.490349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.499701] Call Trace: [ 275.502314] dump_stack+0x244/0x39d [ 275.505958] ? dump_stack_print_info.cold.1+0x20/0x20 [ 275.511165] ? graph_lock+0x270/0x270 [ 275.514986] should_fail.cold.4+0xa/0x17 [ 275.519060] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.524167] ? find_held_lock+0x36/0x1c0 [ 275.528241] ? get_mem_cgroup_from_mm.part.62+0x204/0x880 [ 275.533800] ? lock_downgrade+0x900/0x900 [ 275.537949] ? check_preemption_disabled+0x48/0x280 [ 275.543029] ? kasan_check_read+0x11/0x20 [ 275.547179] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 275.552461] ? graph_lock+0x270/0x270 [ 275.556266] ? rcu_read_unlock_special+0x370/0x370 [ 275.561234] ? rcu_read_unlock+0x16/0x60 [ 275.565392] __alloc_pages_nodemask+0x34b/0xdd0 [ 275.570084] ? kasan_check_read+0x11/0x20 [ 275.574255] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 275.579273] ? rcu_read_unlock_special+0x370/0x370 [ 275.584230] ? rcu_read_unlock+0x33/0x60 [ 275.588300] ? mem_cgroup_handle_over_high+0x150/0x150 [ 275.593584] ? kasan_check_read+0x11/0x20 [ 275.597740] ? graph_lock+0x270/0x270 [ 275.601553] ? trace_hardirqs_off+0xb8/0x310 [ 275.605975] cache_grow_begin+0xa5/0x8c0 [ 275.610046] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.615593] ? check_preemption_disabled+0x48/0x280 [ 275.620622] kmem_cache_alloc+0x66b/0x730 [ 275.624790] anon_vma_clone+0x140/0x710 [ 275.628778] ? unlink_anon_vmas+0xa60/0xa60 [ 275.633113] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 275.638138] __split_vma+0x183/0x570 [ 275.641859] ? find_vma+0x34/0x190 [ 275.645404] __do_munmap+0xd14/0xf80 [ 275.649132] mmap_region+0x6a7/0x1cd0 [ 275.652946] ? __x64_sys_brk+0x8b0/0x8b0 [ 275.657020] ? graph_lock+0x270/0x270 [ 275.660829] ? graph_lock+0x270/0x270 [ 275.664637] ? get_pid_task+0xd6/0x1a0 [ 275.668562] ? mpx_unmapped_area_check+0xd8/0x108 [ 275.673428] ? arch_get_unmapped_area_topdown+0xc2/0x940 [ 275.678892] ? arch_get_unmapped_area+0x750/0x750 [ 275.683775] ? lock_acquire+0x1ed/0x520 [ 275.687754] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 275.692794] ? cap_mmap_addr+0x52/0x130 [ 275.696777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.702319] ? security_mmap_addr+0x80/0xa0 [ 275.706650] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.712196] ? get_unmapped_area+0x292/0x3b0 [ 275.716617] do_mmap+0xa22/0x1230 [ 275.720080] ? mmap_region+0x1cd0/0x1cd0 [ 275.724144] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 275.728213] ? down_read_killable+0x150/0x150 [ 275.732723] ? security_mmap_file+0x174/0x1b0 [ 275.737232] vm_mmap_pgoff+0x213/0x2c0 [ 275.741138] ? vma_is_stack_for_current+0xd0/0xd0 [ 275.745992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.751534] ? check_preemption_disabled+0x48/0x280 [ 275.756578] ksys_mmap_pgoff+0x4da/0x660 [ 275.760659] ? do_syscall_64+0x9a/0x820 [ 275.764646] ? find_mergeable_anon_vma+0xd0/0xd0 [ 275.769407] ? trace_hardirqs_on+0xbd/0x310 [ 275.774268] ? __ia32_sys_read+0xb0/0xb0 [ 275.778362] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.783748] ? trace_hardirqs_off_caller+0x300/0x300 [ 275.788860] __x64_sys_mmap+0xe9/0x1b0 [ 275.792758] do_syscall_64+0x1b9/0x820 [ 275.796653] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.802019] ? syscall_return_slowpath+0x5e0/0x5e0 [ 275.807002] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.811868] ? trace_hardirqs_on_caller+0x310/0x310 [ 275.816897] ? prepare_exit_to_usermode+0x291/0x3b0 [ 275.821924] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.826793] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.831994] RIP: 0033:0x457569 [ 275.835192] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.854123] RSP: 002b:00007ff7a7b8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 275.861840] RAX: ffffffffffffffda RBX: 00007ff7a7b8ec90 RCX: 0000000000457569 [ 275.869804] RDX: 0000000000000000 RSI: 0000000000507000 RDI: 0000000020000000 [ 275.877075] RBP: 000000000072bf00 R08: 0000000000000004 R09: 0000000000000000 [ 275.884377] R10: 4000000000020011 R11: 0000000000000246 R12: 00007ff7a7b8f6d4 [ 275.891646] R13: 00000000004c2b5d R14: 00000000004d4828 R15: 0000000000000005 07:09:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x7000000) 07:09:11 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) listen(r0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0xfe, 0x2, 0xb1, "35c57c1d5987b6a3b7caa10a43ca07ad", "a9635186a522a15675296e2b457d86833280ef3c198827ba8bf72c7338e448cb9ba1b7ad630fb967df9732b74765e1dc7a7b7e7dbcd05d49042624a6d68f102c7574e18d758a454f446e15cc62afa20414934d788a86758997ef75e29d1608d0e3a6192a8ee51942888c9b7bc2d1483a7ce81de40be200f1ae1b3b694bae3f6115ad302c5314e0ea3ae7bb71760ff7ac79d979bac12ecbd636e9b19374cb3f3cad7338338104a87b1469ba98ab89cfd91c2364f6d4e90c3af40b9935b2b35927ad66b5e442843ad70fca4569605a326ac6d7ba66ba0c974cee113f2fc56e452c960e497c02027800f1"}, 0xfe, 0x3) 07:09:11 executing program 2 (fault-call:2 fault-nth:3): syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) 07:09:11 executing program 4: r0 = socket$inet6(0xa, 0x1001000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet(0x15, 0x400000080005, 0x0) connect$inet(r1, &(0x7f000001a000)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$sock_buf(r1, 0x1, 0x1c, &(0x7f0000000300)=""/220, &(0x7f0000000140)=0x2) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000080)={r2, 0x36, "be073af161271f82285e0b075378828ae1ae953535474f8901e098dd2896ea8692f720a6c5a713b2b9165772a4a224317fd067882e93"}, &(0x7f00000000c0)=0x3e) 07:09:11 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 276.105563] FAULT_INJECTION: forcing a failure. [ 276.105563] name failslab, interval 1, probability 0, space 0, times 0 [ 276.143381] CPU: 1 PID: 8508 Comm: syz-executor2 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 276.151909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.161272] Call Trace: [ 276.163898] dump_stack+0x244/0x39d [ 276.167548] ? dump_stack_print_info.cold.1+0x20/0x20 [ 276.172760] ? rcu_softirq_qs+0x20/0x20 [ 276.176819] ? unwind_dump+0x190/0x190 [ 276.180755] should_fail.cold.4+0xa/0x17 [ 276.180774] ? is_bpf_text_address+0xd3/0x170 [ 276.180794] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.180812] ? __kernel_text_address+0xd/0x40 [ 276.180827] ? unwind_get_return_address+0x61/0xa0 [ 276.180852] ? graph_lock+0x270/0x270 [ 276.194507] ? find_held_lock+0x36/0x1c0 [ 276.194530] ? __lock_is_held+0xb5/0x140 [ 276.194561] ? perf_trace_sched_process_exec+0x860/0x860 [ 276.194578] ? kasan_check_read+0x11/0x20 [ 276.194594] ? graph_lock+0x270/0x270 [ 276.194617] __should_failslab+0x124/0x180 [ 276.194637] should_failslab+0x9/0x14 [ 276.194656] kmem_cache_alloc_trace+0x2d7/0x750 [ 276.242020] ? __lock_is_held+0xb5/0x140 [ 276.246186] usbdev_mmap+0x1ba/0x8f0 [ 276.249914] ? rcu_read_lock_sched_held+0x14f/0x180 [ 276.254938] ? usbdev_vm_close+0x50/0x50 [ 276.259029] ? memset+0x31/0x40 [ 276.262319] ? vm_area_alloc+0x15a/0x1d0 [ 276.266386] ? arch_release_thread_stack+0x10/0x10 [ 276.271331] mmap_region+0xe85/0x1cd0 [ 276.275165] ? __x64_sys_brk+0x8b0/0x8b0 [ 276.279247] ? graph_lock+0x270/0x270 [ 276.283068] ? graph_lock+0x270/0x270 [ 276.286880] ? get_pid_task+0xd6/0x1a0 [ 276.290777] ? mpx_unmapped_area_check+0xd8/0x108 [ 276.295812] ? arch_get_unmapped_area+0x750/0x750 [ 276.300665] ? lock_acquire+0x1ed/0x520 [ 276.304646] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 276.309665] ? cap_mmap_addr+0x52/0x130 [ 276.313643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.319225] ? security_mmap_addr+0x80/0xa0 [ 276.323555] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.329098] ? get_unmapped_area+0x292/0x3b0 [ 276.333526] do_mmap+0xa22/0x1230 [ 276.336995] ? mmap_region+0x1cd0/0x1cd0 [ 276.341080] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 276.345150] ? down_read_killable+0x150/0x150 [ 276.349654] ? security_mmap_file+0x174/0x1b0 [ 276.354193] vm_mmap_pgoff+0x213/0x2c0 [ 276.358100] ? vma_is_stack_for_current+0xd0/0xd0 [ 276.362951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.368511] ? check_preemption_disabled+0x48/0x280 [ 276.373551] ksys_mmap_pgoff+0x4da/0x660 [ 276.377617] ? do_syscall_64+0x9a/0x820 [ 276.381620] ? find_mergeable_anon_vma+0xd0/0xd0 [ 276.386386] ? trace_hardirqs_on+0xbd/0x310 [ 276.390721] ? __ia32_sys_read+0xb0/0xb0 [ 276.394791] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.400160] ? trace_hardirqs_off_caller+0x300/0x300 [ 276.405273] __x64_sys_mmap+0xe9/0x1b0 [ 276.409191] do_syscall_64+0x1b9/0x820 [ 276.413088] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 276.418461] ? syscall_return_slowpath+0x5e0/0x5e0 [ 276.423418] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.428267] ? trace_hardirqs_on_caller+0x310/0x310 [ 276.433296] ? prepare_exit_to_usermode+0x291/0x3b0 [ 276.438324] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.443185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.448376] RIP: 0033:0x457569 [ 276.451574] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.470478] RSP: 002b:00007ff7a7b8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 276.478192] RAX: ffffffffffffffda RBX: 00007ff7a7b8ec90 RCX: 0000000000457569 [ 276.485464] RDX: 0000000000000000 RSI: 0000000000507000 RDI: 0000000020000000 [ 276.492754] RBP: 000000000072bf00 R08: 0000000000000004 R09: 0000000000000000 [ 276.500028] R10: 4000000000020011 R11: 0000000000000246 R12: 00007ff7a7b8f6d4 [ 276.507303] R13: 00000000004c2b5d R14: 00000000004d4828 R15: 0000000000000005 07:09:11 executing program 3: mkdir(&(0x7f0000001800)='./file0\x00', 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x100, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r0, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) add_key$user(&(0x7f0000000640)='user\x00', &(0x7f00000007c0)={'syz', 0x1}, &(0x7f0000000800)="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", 0x1000, 0xfffffffffffffff9) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000240)=[@in6={0xa, 0x4e20, 0x7, @mcast1, 0x401}, @in6={0xa, 0x4e20, 0xfffffffffffffffc, @mcast1, 0x10000}, @in6={0xa, 0x4e20, 0x3ff, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}, 0x100000001}, @in6={0xa, 0x4e23, 0x7ff, @loopback, 0x4}], 0x70) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000540)=0x3) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f00000004c0)) capset(&(0x7f00000001c0), &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x3) bind$can_raw(r3, &(0x7f0000000440)={0x1d, r4}, 0x10) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$llc_int(r2, 0x10c, 0x5, &(0x7f0000000600)=0x1, 0x4) 07:09:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8401, 0x0) write$P9_RWRITE(r1, &(0x7f0000000080)={0xb, 0x77, 0x2, 0x405}, 0x2ae) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000480)={0x0, 0xfffffffffffffffe, 0x1, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f]}}}) 07:09:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0xa, &(0x7f0000000080)=0x9, 0x4) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x4b564d02, 0x0, 0x40302e}]}) 07:09:11 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:11 executing program 2 (fault-call:2 fault-nth:4): syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) 07:09:11 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x0) [ 276.853503] Unknown ioctl 35148 07:09:12 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:12 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x7ecd, 0xfffffffffffffffd) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000001c0)={0x0, r1}) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1000, 0x400000) ioctl$KDSETLED(r2, 0x4b32, 0x10000) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x22000) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000080)='tunl0\x00') dup3(r1, r0, 0x0) 07:09:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x2000) 07:09:12 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x20507000, 0x0, 0x4000000000020011, r0, 0x0) [ 277.019182] relay: one or more items not logged [item size (56) > sub-buffer size (9)] 07:09:12 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000500)={0x980000, 0x7f, 0x40, [], &(0x7f00000004c0)={0x990a5e, 0x20, [], @p_u32=&(0x7f0000000480)=0x8}}) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000007c0)=0xffffffffffffff9f) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) r6 = socket$inet6(0xa, 0x803, 0x3) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$TCSETSF(r5, 0x5404, 0x0) write$sndseq(r5, &(0x7f0000000140)=[{0x81, 0x3, 0x0, 0x0, @tick, {}, {}, @raw8={"959546592b83c98a10d789af"}}], 0xffffff1c) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000580)=0x6, 0x4) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000003c0)={r4, 0x1, 0x6, @random="35fddaab3444"}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x1c, 0x1, @in={0x2, 0x4e23, @multicast2}}}, 0xa0) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") unshare(0x8000400) mlockall(0x5) getsockopt$SO_COOKIE(r0, 0x1, 0x5, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$VIDIOC_ENUMINPUT(r2, 0xc050561a, &(0x7f0000000400)={0x7f, "74bf1841880f519940eeca7740e9238ccb01ca7447de8bbd4c10f6eb5afce7a5", 0x3, 0x6, 0x2, 0x830003, 0x100, 0x8}) 07:09:12 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 277.158436] Unknown ioctl 35148 [ 277.197991] relay: one or more items not logged [item size (56) > sub-buffer size (9)] 07:09:12 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) getsockname$unix(r2, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x40045402, &(0x7f0000013000)) 07:09:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000ffb000/0x3000)=nil], 0x0, &(0x7f0000000080), 0x0) r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x93ce, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f00000001c0)={0x3, 0x0, [{0x0, 0x5, 0x7, 0x3ff, 0x79, 0x3f, 0x400}, {0x0, 0x6, 0x2, 0x3, 0x0, 0x7, 0x101}, {0xa, 0x4, 0x3, 0x101, 0x9, 0xf088, 0x2}]}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000080)=""/24) 07:09:12 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x7fffdffff000, 0x0, 0x4000000000020011, r0, 0x0) 07:09:12 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:12 executing program 3: write(0xffffffffffffffff, &(0x7f0000000000)="2400000021002551075c0165ff0ffc020200000000100f0007e1000c08000e0000000000", 0x24) r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video1\x00', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x9, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000100)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000000c0)={0x4, 0x6, 0x8, 0x80000, r2}) 07:09:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@ax25, &(0x7f0000000140)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000200), &(0x7f0000000240)=0xb) keyctl$read(0xb, r0, &(0x7f0000000280), 0xfffffffffffffcea) 07:09:12 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0xfe92, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010407031dfffd946fa283000c200a0009000100031d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 07:09:12 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x50701e, 0x0, 0x4000000000020011, r0, 0x0) 07:09:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0xffffff8c) 07:09:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x66, 0x7, 0x1, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6, 0x7fffffff) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer2\x00', 0x140082, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r4, 0x8991, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f0000000680)={0x1, 0x1, [0xfff, 0x101, 0x3ff, 0x40, 0x0, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f00000004c0)) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20a000, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000380)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000780)='/dev/sequencer2\x00', 0x14003d, 0x0) sendto$inet(r2, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r6, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f0000000700)=ANY=[@ANYBLOB="000028bd7000fddbdf2502000000080003003b000000080001004e2300008c156408c5b6b4635144a45376474b4d65292501d94cad760ced65cf5a0e055f59983edc90da93a7b34ebc9c1888ae09f60c03d26bfa65e3e03328d242938fbbe5d04936f5953c67c33b4007cdc643bf02a2de5af5032dff142ccf00"], 0x1}, 0x1, 0x0, 0x0, 0x20044000}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000800)=ANY=[@ANYBLOB="817abcb82c076b0000a54feeac0000f0d1802d2d094bd06315d0e7855bb65587033e35e494d8362bc9d0fb44b760ad4ebcf1c0e1b6b6018e460032446705d88e"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x200) dup2(r7, r6) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x100000c81, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = syz_open_dev$midi(&(0x7f00000006c0)='/dev/midi#\x00', 0x1, 0x400fc) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000340)=0xc) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="080001000000e82f"], 0x1}}, 0x4008000) socket$nl_generic(0x10, 0x3, 0x10) 07:09:13 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507002, 0x0, 0x4000000000020011, r0, 0x0) 07:09:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 277.908187] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. 07:09:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x4, @multicast2}}, 0x1e) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x200000, &(0x7f0000000640)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532302c74696d656f75743d3078303030303030303030303030303166662c76657273696f6e3d3970323030302e4c2c72717b6e7c6d3030303030303030303030303030372c72713d3078303030303030303204303030304f66662c76657273696f6e3d3970323030302c00086b03dd5b33bf1ef222ee1cf875e1ec972b37db44bd4a4da57d192b734f6e4ed16d052372fe11b69dc02bed0eb30959e1b2005d69b3fc3ac1048124b84f7783ef892f1867aac9590b22ae66ecf2e68484aaf74bf0049049edc33ca0bc7e9c7763ad8aaf642c0093a8dae082704fe7739ac1c44650a18e6f84047edd577c04d6b8b62ab8fb235685aa31afad597cfbba7bc25a480ab8cdfa8a0b1d6d2ee17669376e2ac785ca0a287150506e73106d35d99a9481679a4845e1496da1e82cc7d8860219212d7573ae3c541424b2dee7e88e4cb18f9d42349e1ef6bad3e456e1bc51160ff6c9d7aa7185d23ced6aa294d8a56e110caa61544d6ad743dfe9b02e0ee28b611aafa5d04db98e48e89d7dbfb67bcd055479d31c46559317e6e54f"]) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574ffffffc30000000000bd6800", 0x43732e5398416f17}) close(r1) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000400)=""/79) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000240)=""/190) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000001940)={0x0, 0xffffffffba6b000a, 0x200, 0x0, 0x0, 0x40, 0xfbba}, &(0x7f0000001980)=0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000001a00), &(0x7f0000001a40)=0x8) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000300)={0x2, 0x0, 0x7, 0x0, 0x800}) ioctl$void(r0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x0, 0x4, 0x0, 0xff, 0x5}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x200101, 0x0) 07:09:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 07:09:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:13 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507004, 0x0, 0x4000000000020011, r0, 0x0) [ 278.120560] bond0: Releasing backup interface bond_slave_1 07:09:13 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x20000000, 0x0, 0x4000000000020011, r0, 0x0) 07:09:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) alarm(0x0) socket$unix(0x1, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhci\x00', 0x1, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0xf9, 0x0, [0x18, 0x2, 0x8e4, 0x100000001]}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, r2, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000700)={0x0, &(0x7f0000000600)}) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) write$FUSE_POLL(r3, &(0x7f0000000040)={0x18, 0x0, 0x7, {0x8}}, 0x18) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) r4 = getpid() r5 = gettid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000002c0)={r1, r3, 0x7}) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, &(0x7f0000000300)="c2a50437308a1f6223cd9322c67cffa42bb385ca709439d256085aa7a76f6d4d4d1ab7276826308c99f00c49755440aef65b702504cfbd0185", 0xfffffffffffffebf, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x33e) recvmsg(r2, &(0x7f00000000c0)={&(0x7f0000000340)=@nfc, 0x2, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0xfdbf}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) shutdown(r3, 0x1) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)=0x0) write$cgroup_pid(r2, &(0x7f0000000100)=r6, 0x12) 07:09:13 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x7ffffffff000, 0x0, 0x4000000000020011, r0, 0x0) 07:09:13 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x400000, 0x0, 0x4000000000020011, r0, 0x0) 07:09:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:13 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x707000, 0x0, 0x4000000000020011, r0, 0x0) 07:09:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x8, 0x1, 0x6, 0xe2ad, 0x2931, 0x518de322, 0x100000001}, 0x1c) dup3(r0, r1, 0x0) 07:09:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x1000000) 07:09:14 executing program 3: r0 = socket$inet6(0xa, 0x4000000000003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x8c) r2 = socket$inet6(0xa, 0x6, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x100, 0x0) write$UHID_DESTROY(r3, &(0x7f0000000180), 0x4) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB], 0x0}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r4 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r4, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) r5 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmmsg(r5, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0xc9, 0x0, {0x0, 0xf401}}, 0x80, &(0x7f0000000100), 0x1000000000000215, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 07:09:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x4, @multicast2}}, 0x1e) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x200000, &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574ffffffc30000000000bd6800", 0x43732e5398416f17}) close(r1) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000400)=""/79) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000240)=""/190) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000001940)={0x0, 0xffffffffba6b000a, 0x200, 0x0, 0x0, 0x40, 0xfbba}, &(0x7f0000001980)=0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000001a00), &(0x7f0000001a40)=0x8) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000300)={0x2, 0x0, 0x7, 0x0, 0x800}) ioctl$void(r0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x0, 0x4, 0x0, 0xff, 0x5}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x200101, 0x0) 07:09:14 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x2, 0x4000000000020011, r0, 0x0) 07:09:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x4, @multicast2}}, 0x1e) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x200000, &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574ffffffc30000000000bd6800", 0x43732e5398416f17}) close(r1) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000400)=""/79) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000240)=""/190) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000001940)={0x0, 0xffffffffba6b000a, 0x200, 0x0, 0x0, 0x40, 0xfbba}, &(0x7f0000001980)=0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000001a00), &(0x7f0000001a40)=0x8) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000300)={0x2, 0x0, 0x7, 0x0, 0x800}) ioctl$void(r0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x0, 0x4, 0x0, 0xff, 0x5}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x200101, 0x0) 07:09:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:14 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x20b81e00000000, 0x4000000000020011, r0, 0x0) 07:09:14 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0xffffffffffffffff) r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.syz\x00', 0x0, 0x0, 0x0) 07:09:14 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0xf8faffffffff0f00, 0x4000000000020011, r0, 0x0) 07:09:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0xfffff, 0x0) 07:09:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:14 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x1000000, 0x4000000000020011, r0, 0x0) 07:09:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x10) 07:09:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x4, @multicast2}}, 0x1e) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x200000, &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574ffffffc30000000000bd6800", 0x43732e5398416f17}) close(r1) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000400)=""/79) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000240)=""/190) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000001940)={0x0, 0xffffffffba6b000a, 0x200, 0x0, 0x0, 0x40, 0xfbba}, &(0x7f0000001980)=0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000001a00), &(0x7f0000001a40)=0x8) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000300)={0x2, 0x0, 0x7, 0x0, 0x800}) ioctl$void(r0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x0, 0x4, 0x0, 0xff, 0x5}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x200101, 0x0) 07:09:14 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x2300, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000500)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000600)) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) flistxattr(r1, &(0x7f00000005c0)=""/19, 0x13) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x600, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x6, 0x10000) socket$key(0xf, 0x3, 0x2) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000380)) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fstat(r3, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xf, 0x7fff, 0xd9d4, 0x4, 0x0, r3}, 0x2c) exit(0x0) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f00000001c0)) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f00000003c0)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765050000003d2e2f66696c65302c776f726b6469713d2e2f66696c65315c00c74c0e1a6b30bb4aed2342255218e0b0274d87a4d977119b51abf7"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$TIOCLINUX6(r3, 0x541c, &(0x7f0000000640)={0x6, 0x800}) fchdir(r4) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000680)) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000080)={0xffff, 0x1000, 0x76, &(0x7f0000000240)="c03884138872821211e6511c71b42177190204f8e2d20a9e8da6cdee2baf2a12e2c1ce52b5ed07dc32d35a276ab94e22147a8d0092b158d47809fae0330b5465af28f31ea380e8e312384f07ba49f93b9f4e95d1080f09ba635779e2bf76a7ecfe6cbb66085e5612476478038bf837437d0afc893346"}) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$HDIO_GETGEO(r5, 0x2, &(0x7f0000000040)) 07:09:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(0x0, 0x0) 07:09:14 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x20b81e, 0x4000000000020011, r0, 0x0) 07:09:14 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1ff, 0x94600) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0xc000000000000000, 0x4}}) 07:09:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x8, 0x0, 0x0, 0x800}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000100)={0x4, r3}) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") getsockopt$bt_hci(r0, 0x0, 0x32, &(0x7f0000000000)=""/17, &(0x7f0000000040)=0x11) 07:09:15 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x705, 0x4000000000020011, r0, 0x0) [ 279.971167] overlayfs: unrecognized mount option "lowe" or missing value 07:09:15 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x4, 0x4000000000020011, r0, 0x0) [ 280.055204] kauditd_printk_skb: 4 callbacks suppressed [ 280.055218] audit: type=1804 audit(1543820955.160:45): pid=8741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir140187156/syzkaller.KcQj8W/59/file0" dev="sda1" ino=16724 res=1 07:09:15 executing program 4: setxattr$security_capability(0x0, 0x0, &(0x7f0000000180)=@v1={0x1000000, [{0x0, 0x2}]}, 0xc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$PIO_SCRNMAP(r0, 0x4b41, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r1, 0x0) 07:09:15 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x200000000000000, 0x4000000000020011, r0, 0x0) 07:09:15 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x90081f00000000, 0x4000000000020011, r0, 0x0) [ 280.663272] audit: type=1804 audit(1543820955.770:46): pid=8741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir140187156/syzkaller.KcQj8W/59/file0" dev="sda1" ino=16724 res=1 07:09:15 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x1e00, 0x4000000000020011, r0, 0x0) 07:09:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x604000, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="cc"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 280.713745] overlayfs: unrecognized mount option "lowe" or missing value [ 280.715368] audit: type=1804 audit(1543820955.810:47): pid=8741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir140187156/syzkaller.KcQj8W/59/file0" dev="sda1" ino=16724 res=1 07:09:16 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x2300, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000500)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000600)) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) flistxattr(r1, &(0x7f00000005c0)=""/19, 0x13) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x600, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x6, 0x10000) socket$key(0xf, 0x3, 0x2) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000380)) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fstat(r3, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xf, 0x7fff, 0xd9d4, 0x4, 0x0, r3}, 0x2c) exit(0x0) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f00000001c0)) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f00000003c0)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765050000003d2e2f66696c65302c776f726b6469713d2e2f66696c65315c00c74c0e1a6b30bb4aed2342255218e0b0274d87a4d977119b51abf7"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$TIOCLINUX6(r3, 0x541c, &(0x7f0000000640)={0x6, 0x800}) fchdir(r4) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000680)) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000080)={0xffff, 0x1000, 0x76, &(0x7f0000000240)="c03884138872821211e6511c71b42177190204f8e2d20a9e8da6cdee2baf2a12e2c1ce52b5ed07dc32d35a276ab94e22147a8d0092b158d47809fae0330b5465af28f31ea380e8e312384f07ba49f93b9f4e95d1080f09ba635779e2bf76a7ecfe6cbb66085e5612476478038bf837437d0afc893346"}) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$HDIO_GETGEO(r5, 0x2, &(0x7f0000000040)) 07:09:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x80003, 0x3) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000007a80)={"65727370610000000000102000", r2}) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000007ac0)={r3, @loopback, @loopback}, 0xc) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x2, @empty, 'veth1_to_team\x00'}}) r4 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000040)=[0xfffffffffffffffe, 0x9]) recvmmsg(r1, &(0x7f00000004c0), 0x2b8, 0x22, 0x0) 07:09:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(0x0, 0x0) 07:09:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x6) 07:09:16 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x1f089000, 0x4000000000020011, r0, 0x0) 07:09:16 executing program 4: setxattr$security_capability(0x0, 0x0, &(0x7f0000000180)=@v1={0x1000000, [{0x0, 0x2}]}, 0xc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$PIO_SCRNMAP(r0, 0x4b41, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r1, 0x0) 07:09:16 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x4000000000000000, 0x4000000000020011, r0, 0x0) 07:09:16 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x147e000, 0x4000000000020011, r0, 0x0) [ 281.081478] overlayfs: unrecognized mount option "lowe" or missing value 07:09:16 executing program 4: setxattr$security_capability(0x0, 0x0, &(0x7f0000000180)=@v1={0x1000000, [{0x0, 0x2}]}, 0xc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$PIO_SCRNMAP(r0, 0x4b41, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r1, 0x0) [ 281.111040] audit: type=1804 audit(1543820956.210:48): pid=8823 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir140187156/syzkaller.KcQj8W/60/file0" dev="sda1" ino=16742 res=1 07:09:16 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x0, 0x10002) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000200)={0x9, 0x4, 0x20, 0x100000000, 0x0}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={r1, 0xcd, 0x100}, 0x8) r2 = dup(0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000000)={0x16063435, 0x6, 0x4, 0x1, 0x7, 0x2, 0x1, 0x1, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000080)={r3, @in={{0x2, 0x4e24, @multicast2}}, [0x1, 0x6, 0xb10c, 0x5, 0x1, 0x5, 0x2, 0xae8e, 0x9, 0xfa, 0x10001, 0x1, 0x8000, 0xfffffffffffffff8]}, &(0x7f0000000180)=0x100) syz_emit_ethernet(0x6a, &(0x7f0000000300)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x6, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) 07:09:16 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x1e00000000000000, 0x4000000000020011, r0, 0x0) 07:09:16 executing program 0: r0 = semget(0x3, 0x2, 0x40) semctl$GETPID(r0, 0x0, 0xb, &(0x7f0000000280)=""/66) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$VT_RELDISP(r2, 0x5605) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x6, 0xa, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x239}, @jmp={0x5, 0x7, 0x9, 0x0, 0x0, 0xfffffffffffffff6, 0x1}, @map={0x18, 0x7, 0x1, 0x0, r2}, @alu={0x7, 0x65c, 0x4, 0xb, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @ldst={0x3, 0x0, 0x1, 0x3, 0x6, 0x8, 0x10}, @map={0x18, 0x4, 0x1, 0x0, r2}, @ldst={0x3, 0x3, 0x2, 0xa, 0x7, 0xfffffffffffffff4, 0xffffffffffffffff}], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1}, 0x48) r3 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x83c, 0x109002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f00000001c0)={0x8000, 0x40000000000000, 0x4, 'queue1\x00', 0xff}) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x6000000, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0xffffffff00000000}}]}]}, 0x2c}}, 0x0) [ 281.300197] netlink: get zone limit has 4 unknown bytes 07:09:16 executing program 3: r0 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x101) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) write$P9_RSTAT(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$sndseq(r2, &(0x7f0000000080), 0x0) 07:09:16 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x8000000000000000, 0x4000000000020011, r0, 0x0) 07:09:16 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)=0x0) getpid() capset(&(0x7f00000003c0), &(0x7f0000000400)={0x0, 0xfffffffffffff026, 0x5}) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000000c0)={0x0, 0x81, 0x0, 0x0, &(0x7f0000ffb000/0x3000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000740)='/dev/audio\x00', 0x143001, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000007440), 0x0, 0x0, &(0x7f0000007640)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000440)={0xd, {0x7fffffff, 0x8, 0xc2d, 0xea}, {0x4, 0x0, 0x81, 0x9}, {0x6, 0x8080000000000000}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00', 0x10}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000002c0)=0x4, 0x4) read(r2, &(0x7f0000004700)=""/11, 0xb) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000140)={0x2000}) close(r3) r5 = syz_open_procfs(r0, &(0x7f0000000480)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0x28}, 0x28) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000000)={'ip6gre0\x00', {0x2, 0x4e20, @empty}}) sendmmsg(0xffffffffffffffff, &(0x7f00000045c0)=[{{&(0x7f0000000300)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x1}}, {{0x0, 0x0, &(0x7f0000003400), 0x0, &(0x7f0000003480), 0x0, 0x4000005}}], 0x2, 0x40) r6 = syz_open_dev$mouse(0x0, 0xfffffffffffff0aa, 0x111000) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f0000000380)) socket(0x40000000015, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f0000000080), &(0x7f0000000240)=0x4) ioctl$VIDIOC_QUERY_EXT_CTRL(r5, 0xc0e85667, &(0x7f0000000500)={0x80000000, 0xd, "9d231c6409f91f09150456c4bbdfab7a5f543dc990982be2b2dccfee35569f7e", 0x20, 0x81, 0x5, 0x80000000, 0x4, 0x9029, 0x7, 0x4, [0x400, 0x9, 0x10000, 0x20]}) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000004940)) 07:09:16 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20000, 0x0) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000180)=""/175, 0xaf}, {&(0x7f0000000240)=""/63, 0x3f}], 0x2, &(0x7f00000002c0)=""/84, 0x54, 0x6ba}, 0x40000002) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r4, 0x6, 0xb, 0x0, &(0x7f0000013000)) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) dup3(r2, r4, 0x0) close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000380)={r5}) 07:09:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(0x0, 0x0) 07:09:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x3f00000000000000) 07:09:17 executing program 3: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0), 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) r2 = getuid() fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000080)='./file1\x00', r2, r3, 0x1000) connect$l2tp(r0, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x2) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"f519c26b46710ca78e04d78c1919b555b36974efefd12a5f693fed32d32e4afb3b7acb8d05ff620fa450096177657adaf73e6281a99f2bd97da49be3c011a372ccd10467917c62526764ecce731d7daa44a7b4747f9bdd3a837565958c32d3b04de8745247696a320a7cc3d8d19cd7c8ac7eadd62713f27ab43d88d64439b4e4984214a4e06891cd37992574d2678c56fcda8399ab173613bc35d0a53e617c4d3dc3a078f643883bcf028a87441630dc1972a204830674e678a1051c4aac49f040cda971395717c516e6c05b7722f69ecafade2054088b147e35675af272afaeff24cff4880243832d9099038e7df06bb1ad162678bf9952aa5ab758714e4a0aa8114c51f33af2fa1632a9cac985bf40f38e5cdfe7b57d2ad9cb47d13b7d7e20e61c5a7597d586c54961d9d2af6670ab9538c34d2a86d0123077fcd9a36861504535e944aa0cf07b56687b583afb6fa07fb62c2a9e11822c8e09234a001f8bc7fe17a83a22e1b02a31ba85d04e72c2f2d4942d264c12eab0b3bc6116ac23c1df6dfd4a46b254fc2fa97439637a80b23a8d0103ac9b012fcca76750b68cb9f891a32bf2e1f1f4b50af28f7b698d0486d8ba39c85d894d906c4beaf4287577a212f05db8dd0fca4d7a6cc9185e7bf0f6197918d8df2d8f85178bed4a374249b472f0f43daeebea2ca6f3cc98c851858b7d6d3d17d98afb79798849b076a73f46574b0f206bbcc9f0fbb90347df3d259ee0f2a2b13bbf88c9d3f522dacd1c466b0681e4b36fc0e37f7426a7ca42976d56fa7c0418d80e3395808768b7cc2441dd1f1f7c69322abb61fa35986daa55a30150b8e09ac6ca29def750ec6481cc5eb865b94121739babb9113065963d64b6743e307207970c4d40196a1fec59fe996efd6d9f223225af228f00bc1dd97c26feb91dd07ef3e6de2e79d44558f9741ef37e0c92689529fd5397319336c4d40a643d3858a0727dce2f39805724089b61b5d4c12e8c10c7f3809ae80fc3c6c54d404e909e33e0f0014501b7f4a05d972fd48f5b8dbcb847be5cbdb0b0621d9ece9fb14d748ee9c522fee9dbc371d72acdd2c9400eb50e1d1336497c12d1f58cd71c60c9ee14a47131af699dbe20928c8616dfae9b14ea92d64ee0b9b57e52f013e436005f0507784cf8fda98e01bcb5471c551e4bf9a0da52b6c310206b464914ac8fcd36a2e2f1c40d0b55ecf1dff89fada96105318e01bc23f52afab72e078c9eabf31620092919d692dd7836d1bae2d65a5b8be79e6d92128a7a43f19bbf6e45033530ec4db8f5c25206fd96c141de7744ef07142800d75984e24f9d92f4e4be723539bd07a6ab29e1a055de36e360d16254e193c3532df960f30527737b5d538969ef54d923b2a333564a256fe9872cad4cdbe4e635ec31ef75f0571bdd496962905f3a57ba778b04240167eed7976043"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) 07:09:17 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0xe0470100000000, 0x4000000000020011, r0, 0x0) 07:09:17 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x1000000, &(0x7f0000000040)="6546dcb23acf10f6417308960043665d7d1627a424be9c64e596b59351c874fb7f8e69098563224d5ee121", 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(0x0, 0x0, 0x3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, 0x0) 07:09:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x4000000000000) [ 282.065971] overlayfs: failed to resolve './file1': -2 07:09:17 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0xe04701, 0x4000000000020011, r0, 0x0) 07:09:17 executing program 0: sigaltstack(&(0x7f0000436000/0x4000)=nil, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) move_pages(r0, 0x6, &(0x7f0000000040)=[&(0x7f0000e6c000/0x1000)=nil, &(0x7f0000bc2000/0x3000)=nil, &(0x7f0000885000/0x4000)=nil, &(0x7f0000f47000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000b6e000/0x5000)=nil], &(0x7f0000000080)=[0x7fff, 0x36d304fa, 0x10001, 0xffffffffffffff01, 0x5, 0x40, 0x20, 0x4, 0xe3, 0x100000001], &(0x7f00000000c0)=[0x0], 0x4) [ 282.256109] xprt_adjust_timeout: rq_timeout = 0! 07:09:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0xfdffffff) 07:09:17 executing program 0: sigaltstack(&(0x7f0000436000/0x4000)=nil, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) move_pages(r0, 0x6, &(0x7f0000000040)=[&(0x7f0000e6c000/0x1000)=nil, &(0x7f0000bc2000/0x3000)=nil, &(0x7f0000885000/0x4000)=nil, &(0x7f0000f47000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000b6e000/0x5000)=nil], &(0x7f0000000080)=[0x7fff, 0x36d304fa, 0x10001, 0xffffffffffffff01, 0x5, 0x40, 0x20, 0x4, 0xe3, 0x100000001], &(0x7f00000000c0)=[0x0], 0x4) 07:09:17 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x4000000, 0x4000000000020011, r0, 0x0) [ 282.316335] FS-Cache: Duplicate cookie detected [ 282.321070] FS-Cache: O-cookie c=0000000037eacf7e [p=000000002a7f76a1 fl=222 nc=0 na=1] [ 282.321083] FS-Cache: O-cookie d=0000000031c0129f n=00000000fb1cbf3a [ 282.321090] FS-Cache: O-key=[22] '02000a00000000000000040001000000000000000000' [ 282.343450] FS-Cache: N-cookie c=000000003209bcaa [p=000000002a7f76a1 fl=2 nc=0 na=1] [ 282.343467] FS-Cache: N-cookie d=0000000031c0129f n=000000002cad4790 [ 282.357962] FS-Cache: N-key=[22] '02000a00000000000000040001000000000000000000' 07:09:17 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = accept4(r0, &(0x7f00000001c0)=@hci, &(0x7f0000000080)=0x80, 0x80800) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0x72, "2922349da67e1eacde56957f85473f152a9229f7389987c3970d5be4da782b44bfed71bf92dd30a1f83bf48a56193f46754c12b25b131515a74030febfaa9092e9095ceead5649158f1ed50a70dab183783e64030da197ddae1fc943d7883cd22a4eb591e6a9a4b397d9e19f973f06a90f4a"}, &(0x7f0000000100)=0x7a) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000002c0)={0x0, 0x3}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000340)={r2, 0x2, 0x2, 0x5, 0xff, 0x0, 0x8, 0x10000, {r3, @in6={{0xa, 0x4e24, 0x4, @mcast1, 0x22f}}, 0xadf8, 0x100000000, 0x8, 0x0, 0x6}}, &(0x7f0000000400)=0xb0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(r4, &(0x7f00000000c0)={&(0x7f0000139ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000000)="be", 0x1}], 0x1, &(0x7f0000000100)}, 0x0) sendmmsg$inet_sctp(r4, &(0x7f000093eee8)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0xe5, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x203}}], 0x20}], 0x54b, 0x0) [ 282.470936] overlayfs: failed to resolve './file1': -2 [ 282.514125] xprt_adjust_timeout: rq_timeout = 0! 07:09:17 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x1f000000, 0x4000000000020011, r0, 0x0) 07:09:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x880d}) mkdir(&(0x7f0000000140)='./file0\x00', 0x40) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004880)={0x0, 0x0}, &(0x7f00000048c0)=0xc) stat(&(0x7f0000004900)='./file0\x00', &(0x7f0000004940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000004b40)=ANY=[@ANYBLOB="6000000034b40fb4353d0c19b99d8294b33f18d0e94b8ea40c8fcd0035bba61dc585b8616fbe66f1a90de296df709a53beaddff1ce892e958997cce2fbf4490c2f379b3ce55e418b1b111d54c76da045e92c34b2e85a82ca623a8d0000000000000000000000000000"], 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000004ac0)={0x0, 0x0, 0x10}, &(0x7f0000004b00)=0xc) fchownat(r0, &(0x7f00000006c0)='./file0\x00', r1, r2, 0x100) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file1\x00') sendmmsg$alg(r0, &(0x7f0000004700)=[{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000001ac0)="aa123eac9a4101dce751753b766468f697b9ce7360b8e31309c2744f4dad18b68c9dbd51d6e29696c0dee24b964b8b27c89c45ae4f43c719603025dea3af758910f3b13549410d0d5e92cbae3ef1432f67e1594038c379fc168eee33c4ac7669166cb0a997d197eb8fb1ca6616dea0aa85476cfaf5ac52694d3302b34f05f880fb986cde31ec43b1a736f3de539212efe2e8e4ebb6ae4501dd4149fe09789440d7e97d5b2271ae09b8f6f94e58269c5585", 0xb1}], 0x1, 0x0, 0x0, 0x40}, {0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000001cc0)="1cb120b6ec80ee2f0867", 0xa}], 0x1, 0x0, 0x0, 0x48000}, {0x0, 0x0, &(0x7f00000031c0)=[{&(0x7f0000003140)="61f2c9d50af5b8f2b2884f3b1a3b454b1b7e89f9e7705a3507f2d0eaa8ca6e1e0f003cda842aa6d893fa5b8a75887a2d9aa4ee0240825ebbea41c539ede78af1e5", 0x41}], 0x1, 0x0, 0x0, 0x4004000}, {0x0, 0x0, &(0x7f0000004600)=[{&(0x7f0000004500)="551e0c9292d2a09bcf24f6338d78dc65b0c48e187facca7d3a304d678c22d7e97206966095ea9d53e0c5e20c09172bb67d31dd2d3df61033a02002d97d1e5e5575bfa649457e16a0aaa6796e450694e90ce79c20ad1b3d3d70f415f9b65a40fa8e4cd0ed7db07dcc56a204a15db603c64efe614b60a017f15b8544b0638cd6cb724b4a60ecb1ca6d1ef80ce6b9d8201ff0a8b91b4915987e7310022f7f813637a9735d4f66a0a81557118a0dd404209ecc6cfb15006e18e4222a643db9a323b500d2ae8abb5096054be238202b92f9a948928bde33c160a1a2833a98f8f2d5343475c58ae14d", 0xe6}], 0x1, 0x0, 0x0, 0x4000}], 0x4, 0x20000000) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f00000001c0)={0x0, 0xe, "666517882375630a3b1b3e343e70a53b3b9f9b603102fee4827434256d65701f", 0x0, 0x0, 0x2, 0x3}) write$P9_RVERSION(r0, &(0x7f0000000240)={0x15, 0x65, 0xffff, 0xffffffff9715039c, 0x8, '9P2000.L'}, 0x15) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000049c0)=0x8, 0x4) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000340)='fuseblk\x00', &(0x7f0000000380)='fuseblk\x00', &(0x7f0000000400)='fuseblk\x00', &(0x7f0000000440)='-vboxnet0\x00', &(0x7f0000000480)='eth1\x00', &(0x7f00000004c0)='fuseblk\x00', &(0x7f0000000500)='vmnet0vmnet1\x00'], &(0x7f0000000640)=[&(0x7f0000000580)='cgroup\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)=',nodev$ppp1)\x00']) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="3d056dae163d02fb1bd9a905d6"]) socket(0x1e, 0x4, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000003c0)={0x0, 0x5, 0x7}, 0x8) 07:09:17 executing program 3: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0), 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) r2 = getuid() fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000080)='./file1\x00', r2, r3, 0x1000) connect$l2tp(r0, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x2) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"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"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) 07:09:17 executing program 0: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x80003, 0x2c) fcntl$addseals(r0, 0x409, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000240)={@empty, @rand_addr=0x7fff, r2}, 0xc) sendmmsg(r1, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) 07:09:17 executing program 1 (fault-call:5 fault-nth:0): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:17 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x1e000000, 0x4000000000020011, r0, 0x0) [ 282.817899] overlayfs: failed to resolve './file1': -2 07:09:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x880d}) mkdir(&(0x7f0000000140)='./file0\x00', 0x40) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004880)={0x0, 0x0}, &(0x7f00000048c0)=0xc) stat(&(0x7f0000004900)='./file0\x00', &(0x7f0000004940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000004b40)=ANY=[@ANYBLOB="6000000034b40fb4353d0c19b99d8294b33f18d0e94b8ea40c8fcd0035bba61dc585b8616fbe66f1a90de296df709a53beaddff1ce892e958997cce2fbf4490c2f379b3ce55e418b1b111d54c76da045e92c34b2e85a82ca623a8d0000000000000000000000000000"], 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000004ac0)={0x0, 0x0, 0x10}, &(0x7f0000004b00)=0xc) fchownat(r0, &(0x7f00000006c0)='./file0\x00', r1, r2, 0x100) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file1\x00') sendmmsg$alg(r0, &(0x7f0000004700)=[{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000001ac0)="aa123eac9a4101dce751753b766468f697b9ce7360b8e31309c2744f4dad18b68c9dbd51d6e29696c0dee24b964b8b27c89c45ae4f43c719603025dea3af758910f3b13549410d0d5e92cbae3ef1432f67e1594038c379fc168eee33c4ac7669166cb0a997d197eb8fb1ca6616dea0aa85476cfaf5ac52694d3302b34f05f880fb986cde31ec43b1a736f3de539212efe2e8e4ebb6ae4501dd4149fe09789440d7e97d5b2271ae09b8f6f94e58269c5585", 0xb1}], 0x1, 0x0, 0x0, 0x40}, {0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000001cc0)="1cb120b6ec80ee2f0867", 0xa}], 0x1, 0x0, 0x0, 0x48000}, {0x0, 0x0, &(0x7f00000031c0)=[{&(0x7f0000003140)="61f2c9d50af5b8f2b2884f3b1a3b454b1b7e89f9e7705a3507f2d0eaa8ca6e1e0f003cda842aa6d893fa5b8a75887a2d9aa4ee0240825ebbea41c539ede78af1e5", 0x41}], 0x1, 0x0, 0x0, 0x4004000}, {0x0, 0x0, &(0x7f0000004600)=[{&(0x7f0000004500)="551e0c9292d2a09bcf24f6338d78dc65b0c48e187facca7d3a304d678c22d7e97206966095ea9d53e0c5e20c09172bb67d31dd2d3df61033a02002d97d1e5e5575bfa649457e16a0aaa6796e450694e90ce79c20ad1b3d3d70f415f9b65a40fa8e4cd0ed7db07dcc56a204a15db603c64efe614b60a017f15b8544b0638cd6cb724b4a60ecb1ca6d1ef80ce6b9d8201ff0a8b91b4915987e7310022f7f813637a9735d4f66a0a81557118a0dd404209ecc6cfb15006e18e4222a643db9a323b500d2ae8abb5096054be238202b92f9a948928bde33c160a1a2833a98f8f2d5343475c58ae14d", 0xe6}], 0x1, 0x0, 0x0, 0x4000}], 0x4, 0x20000000) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f00000001c0)={0x0, 0xe, "666517882375630a3b1b3e343e70a53b3b9f9b603102fee4827434256d65701f", 0x0, 0x0, 0x2, 0x3}) write$P9_RVERSION(r0, &(0x7f0000000240)={0x15, 0x65, 0xffff, 0xffffffff9715039c, 0x8, '9P2000.L'}, 0x15) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000049c0)=0x8, 0x4) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000340)='fuseblk\x00', &(0x7f0000000380)='fuseblk\x00', &(0x7f0000000400)='fuseblk\x00', &(0x7f0000000440)='-vboxnet0\x00', &(0x7f0000000480)='eth1\x00', &(0x7f00000004c0)='fuseblk\x00', &(0x7f0000000500)='vmnet0vmnet1\x00'], &(0x7f0000000640)=[&(0x7f0000000580)='cgroup\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)=',nodev$ppp1)\x00']) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="3d056dae163d02fb1bd9a905d6"]) socket(0x1e, 0x4, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000003c0)={0x0, 0x5, 0x7}, 0x8) 07:09:18 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x1f00, 0x4000000000020011, r0, 0x0) 07:09:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x40000) 07:09:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:18 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x1eb82000, 0x4000000000020011, r0, 0x0) 07:09:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @broadcast}, {}, 0x0, {}, "00000000000010000000000000000004"}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x10000000000000, 0x96000) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f00000000c0)={0x53f9dcdf, 0x1000}) write$P9_RLOPEN(r1, &(0x7f0000000100)={0x18, 0xd, 0x2, {{0x0, 0x4, 0x2}, 0x25}}, 0x18) 07:09:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x3d62b074a442d7ab) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000340)={0x6, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x7, &(0x7f00000002c0)={@loopback, @multicast1}, 0xd6) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000040)=0x20) 07:09:18 executing program 3: mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000240)) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1, 0x105500) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000280)=0xa1) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRES64, @ANYRES32, @ANYPTR64, @ANYPTR, @ANYRES16, @ANYRES16]]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r2, 0x400000000000000, 0x0) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) ioctl$KIOCSOUND(r2, 0x4b2f, 0x7) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000140)=0x4, &(0x7f00000001c0)=0x2) 07:09:18 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x507, 0x4000000000020011, r0, 0x0) 07:09:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fdatasync(r0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040)={0x4, 0x9, 0x0, 0xfffffffffffffc01, 0x2, 0x2, 0x8001, 0x3, 0x100000000, 0xb82}, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) poll(&(0x7f0000000100)=[{r2, 0x50012}], 0x1, 0xff) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) writev(r2, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 07:09:18 executing program 4: ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x6, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0}) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)={r1}) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0) getsockname$packet(r0, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b00)=0x11a) sendto$packet(r0, &(0x7f0000000a80)="2a11f1b5bd5a7b46ea129772e358a020f8ddb29fbd596167713878030a3f46ac45f2cbd24b4c0306fbf7397578535d5c", 0x30, 0xc5, &(0x7f0000000b40)={0x11, 0xa, r2, 0x1, 0xf5e3, 0x6, @broadcast}, 0x14) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/net/pfkey\x00', 0x10400, 0x0) rename(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f0000000740)=0xc) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x48, &(0x7f0000000140)=[@in={0x2, 0x4e22, @rand_addr=0x1ff}, @in6={0xa, 0x4e23, 0x4, @loopback, 0x100000000}, @in6={0xa, 0x4e21, 0x7, @ipv4={[], [], @multicast2}, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e24, 0x1000, @mcast1, 0x2cbb23a}}, 0x0, 0x3d6f, 0x8000, 0x2, 0x4}, &(0x7f0000000340)=0x98) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000640)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000680)={0x1, r6}) accept4(r3, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000200)=0x80, 0x800) openat$mixer(0xffffffffffffff9c, &(0x7f0000000780)='/dev/mixer\x00', 0x0, 0x0) r7 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r7, 0x8922, &(0x7f0000000100)={'bond0\x00', 0x7f}) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000880)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000a40)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x28c4}, 0xc, &(0x7f0000000a00)={&(0x7f0000000900)={0xd4, r8, 0xc04, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xb7}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x12}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1d}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5a}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0xc010}, 0x20000800) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000007c0)={0x0, 0x101, 0x3, 0x26c, 0x9c9, 0x1, 0x7, 0x9, 0x6, 0x401}) 07:09:18 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x400000000000, 0x4000000000020011, r0, 0x0) 07:09:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x20000070, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:18 executing program 3: clone(0xa3fffffc, 0x0, 0x0, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RRENAME(r0, &(0x7f0000000040)={0x7, 0x15, 0x2}, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = getpgid(0x0) setpgid(r1, r2) 07:09:19 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0xfffffffffffffffc, 0x4) bind$bt_rfcomm(r1, &(0x7f0000000100)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x2}}, 0xa) recvmmsg(r1, &(0x7f0000008400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:09:19 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x2000000, 0x4000000000020011, r0, 0x0) 07:09:19 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0xf, 0x5, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001800)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000001600)=[{{&(0x7f00000003c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000140)=""/54, 0x36}, {&(0x7f00000005c0)=""/193, 0xc1}, {&(0x7f00000006c0)=""/107, 0x6b}], 0x4, 0x0, 0x0, 0x3}, 0x2}], 0x1, 0x0, 0x0) 07:09:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x4000000) 07:09:19 executing program 4: ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x6, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0}) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)={r1}) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0) getsockname$packet(r0, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b00)=0x11a) sendto$packet(r0, &(0x7f0000000a80)="2a11f1b5bd5a7b46ea129772e358a020f8ddb29fbd596167713878030a3f46ac45f2cbd24b4c0306fbf7397578535d5c", 0x30, 0xc5, &(0x7f0000000b40)={0x11, 0xa, r2, 0x1, 0xf5e3, 0x6, @broadcast}, 0x14) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/net/pfkey\x00', 0x10400, 0x0) rename(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f0000000740)=0xc) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x48, &(0x7f0000000140)=[@in={0x2, 0x4e22, @rand_addr=0x1ff}, @in6={0xa, 0x4e23, 0x4, @loopback, 0x100000000}, @in6={0xa, 0x4e21, 0x7, @ipv4={[], [], @multicast2}, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e24, 0x1000, @mcast1, 0x2cbb23a}}, 0x0, 0x3d6f, 0x8000, 0x2, 0x4}, &(0x7f0000000340)=0x98) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000640)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000680)={0x1, r6}) accept4(r3, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000200)=0x80, 0x800) openat$mixer(0xffffffffffffff9c, &(0x7f0000000780)='/dev/mixer\x00', 0x0, 0x0) r7 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r7, 0x8922, &(0x7f0000000100)={'bond0\x00', 0x7f}) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000880)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000a40)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x28c4}, 0xc, &(0x7f0000000a00)={&(0x7f0000000900)={0xd4, r8, 0xc04, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xb7}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x12}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1d}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5a}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0xc010}, 0x20000800) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000007c0)={0x0, 0x101, 0x3, 0x26c, 0x9c9, 0x1, 0x7, 0x9, 0x6, 0x401}) 07:09:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001800)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000001600)=[{{&(0x7f00000003c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000140)=""/54, 0x36}, {&(0x7f00000005c0)=""/193, 0xc1}, {&(0x7f00000006c0)=""/107, 0x6b}], 0x4, 0x0, 0x0, 0x3}, 0x2}], 0x1, 0x0, 0x0) 07:09:19 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0xffffffffffaf8, 0x4000000000020011, r0, 0x0) 07:09:19 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0xfffffffffffffffc, 0x4) bind$bt_rfcomm(r1, &(0x7f0000000100)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x2}}, 0xa) recvmmsg(r1, &(0x7f0000008400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:09:19 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x3, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:19 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x88) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) mount(0x0, &(0x7f000000fff8)='./file0\x00', 0x0, 0x7ffbf, 0x0) 07:09:19 executing program 0: r0 = memfd_create(&(0x7f0000000140)="9ede7a885ae95e4800800000000000604f13eeab65c0323901dc6b0000000032f01b7f0b014f9f91eeb7c37c7240f476c8d753000074dbcfa6b74d00", 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x20005) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(blowfish)\x00'}, 0x58) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, "9ede7a885ae95e4800800000000000604f13eeab65c0323901dc6b0000000032f01b7f0b014f9f91eeb7c37c7240f476c8d753000074dbcfa6b74d00"}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="07010000000000009d030000000000000000089b1081f70d01000000"], 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x3f}) 07:09:19 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x1f00000000000000, 0x4000000000020011, r0, 0x0) 07:09:19 executing program 3: write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x4000000000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000200)=0x7, 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, 0x0) read(r1, &(0x7f00000003c0)=""/72, 0xbb43ad6b) sendmsg$xdp(r1, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) getresgid(0x0, &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0x4) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@umask={'umask'}}, {@umask={'umask', 0x3d, 0x7980}}, {@iocharset={'iocharset', 0x3d, 'maccyrillic'}}], [{@appraise='appraise'}, {@smackfshat={'smackfshat'}}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) accept$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000440)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x1, &(0x7f00000001c0)=@raw=[@exit], &(0x7f0000000340)='syzkaller\x00', 0xffff, 0x0, 0x0, 0x41f00, 0x1, [], r3, 0xf}, 0x48) 07:09:19 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="5500000018007f0860fe01b2a4a280930a600809ffa84302910009003900090023000c001a00000009000500fe0b0b000000c78b80082314e9030b9d566885b167320b00070038d54400009b84136ef75afb83de48", 0x55}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x8, 0x30, 0xfe87, 0xfffffffffffffff8}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000100)={r1, 0xe2}, &(0x7f0000000140)=0x8) 07:09:19 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x705000000000000, 0x4000000000020011, r0, 0x0) [ 284.691662] hfs: unable to parse mount options 07:09:20 executing program 0: r0 = memfd_create(&(0x7f0000000140)="9ede7a885ae95e4800800000000000604f13eeab65c0323901dc6b0000000032f01b7f0b014f9f91eeb7c37c7240f476c8d753000074dbcfa6b74d00", 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x20005) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(blowfish)\x00'}, 0x58) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, "9ede7a885ae95e4800800000000000604f13eeab65c0323901dc6b0000000032f01b7f0b014f9f91eeb7c37c7240f476c8d753000074dbcfa6b74d00"}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="07010000000000009d030000000000000000089b1081f70d01000000"], 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x3f}) 07:09:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0xffffff97) 07:09:20 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x400000000000000, 0x4000000000020011, r0, 0x0) 07:09:20 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x4, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:20 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000040)={{0x32, @multicast1, 0x4e21, 0x3, 'lblc\x00', 0x3, 0x3, 0x33}, {@multicast1, 0x4e21, 0x12000, 0x6, 0x200, 0xe0}}, 0x44) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) 07:09:20 executing program 0: r0 = memfd_create(&(0x7f0000000140)="9ede7a885ae95e4800800000000000604f13eeab65c0323901dc6b0000000032f01b7f0b014f9f91eeb7c37c7240f476c8d753000074dbcfa6b74d00", 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x20005) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(blowfish)\x00'}, 0x58) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, "9ede7a885ae95e4800800000000000604f13eeab65c0323901dc6b0000000032f01b7f0b014f9f91eeb7c37c7240f476c8d753000074dbcfa6b74d00"}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="07010000000000009d030000000000000000089b1081f70d01000000"], 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x3f}) 07:09:20 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x40000000, 0x4000000000020011, r0, 0x0) 07:09:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000200)={{0xa, 0x4e23, 0x6, @mcast1, 0x20}, {0xa, 0x4e21, 0x1ff, @loopback, 0x9}, 0x2, [0x4, 0x101, 0x9, 0x3, 0x9, 0x4, 0x3, 0x80000000]}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000040)={{0x4, 0x401}, {0x0, 0x3}, 0x8, 0x1, 0x81}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) open$dir(&(0x7f0000000140)='./file0\x00', 0x20000, 0x111) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000480)="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") 07:09:20 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x6, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 285.365362] QAT: Invalid ioctl [ 285.377824] QAT: Invalid ioctl [ 285.390341] QAT: Invalid ioctl [ 285.394327] QAT: Invalid ioctl 07:09:20 executing program 3: write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x4000000000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) write$eventfd(0xffffffffffffffff, &(0x7f0000000200)=0x7, 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, 0x0) read(r1, &(0x7f00000003c0)=""/72, 0xbb43ad6b) sendmsg$xdp(r1, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) getresgid(0x0, &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0x4) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@umask={'umask'}}, {@umask={'umask', 0x3d, 0x7980}}, {@iocharset={'iocharset', 0x3d, 'maccyrillic'}}], [{@appraise='appraise'}, {@smackfshat={'smackfshat'}}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) accept$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000440)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x1, &(0x7f00000001c0)=@raw=[@exit], &(0x7f0000000340)='syzkaller\x00', 0xffff, 0x0, 0x0, 0x41f00, 0x1, [], r3, 0xf}, 0x48) 07:09:20 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x4000, 0x4000000000020011, r0, 0x0) 07:09:20 executing program 0: r0 = memfd_create(&(0x7f0000000140)="9ede7a885ae95e4800800000000000604f13eeab65c0323901dc6b0000000032f01b7f0b014f9f91eeb7c37c7240f476c8d753000074dbcfa6b74d00", 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x20005) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(blowfish)\x00'}, 0x58) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, "9ede7a885ae95e4800800000000000604f13eeab65c0323901dc6b0000000032f01b7f0b014f9f91eeb7c37c7240f476c8d753000074dbcfa6b74d00"}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="07010000000000009d030000000000000000089b1081f70d01000000"], 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x3f}) 07:09:20 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 285.798197] hfs: unable to parse mount options 07:09:21 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x100000000000000, 0x4000000000020011, r0, 0x0) 07:09:21 executing program 4: r0 = socket$inet(0x2, 0x2000000080002, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2000) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x4, @empty, 'bcsh0\x00'}}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x2, 0x0, &(0x7f0000000a80)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', "73697430000002000000ffff00", 'bond0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) exit_group(0x0) 07:09:21 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000140)={0xfffffffffffffffd, 0x7, 0xc145, 0x8, 0x6, 0x0, 0x37000, 0x9, 0x5, 0x11b}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x0, @multicast2}}) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$inet6(0xa, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) sched_yield() write$tun(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="a86db4276c75"], 0x1) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000380)=0x0) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r5, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(r6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xffffffffffffffce) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r7 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) dup3(r0, r7, 0x80000) bind$bt_sco(r2, &(0x7f00000000c0)={0x1f, {0x7, 0x40, 0x8, 0x40, 0x0, 0x8}}, 0x8) 07:09:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x5) 07:09:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x3f00, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:21 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x400000, 0x4000000000020011, r0, 0x0) [ 286.048319] ebtables: ebtables: counters copy to user failed while replacing table 07:09:21 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x1e, 0x4000000000020011, r0, 0x0) 07:09:21 executing program 4: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x100000000000000, 0x4000000000020011, r0, 0x0) 07:09:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0xffffffff00000000, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:21 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x90081f, 0x4000000000020011, r0, 0x0) 07:09:21 executing program 3: ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000140)) truncate(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x6, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0}) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)={r1}) mkdir(&(0x7f0000000380)='./file0\x00', 0x1) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0) getsockname$packet(r0, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b00)=0x11a) sendto$packet(r0, &(0x7f0000000a80)="2a11f1b5bd5a7b46ea129772e358a020f8ddb29fbd596167713878030a3f46ac45f2cbd24b4c0306fbf7397578535d5c", 0x30, 0xc5, &(0x7f0000000b40)={0x11, 0x80000000a, r2, 0x1, 0xf5e3}, 0x14) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/net/pfkey\x00', 0x10400, 0x0) rename(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f0000000740)=0xc) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x48, &(0x7f0000000140)=[@in={0x2, 0x4e22, @rand_addr=0x1ff}, @in6={0xa, 0x4e23, 0x4, @loopback, 0x100000000}, @in6={0xa, 0x4e21, 0x7, @ipv4={[], [], @multicast2}, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e24, 0x1000, @mcast1, 0x2cbb23a}}, 0x0, 0x3d6f, 0x8000, 0x2, 0x4}, &(0x7f0000000340)=0x98) ioctl$UI_SET_KEYBIT(r3, 0x40045565, 0x20b) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000640)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000680)={0x1, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000780)='/dev/mixer\x00', 0x0, 0x0) r7 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r7, 0x8922, &(0x7f0000000100)={'bond0\x00', 0x7f}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000880)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000a40)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x28c4}, 0xc, &(0x7f0000000a00)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0xc010}, 0x20000800) ioctl$SIOCSIFMTU(r7, 0x8922, &(0x7f0000000080)={'bond0\x00', 0x1000}) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)="4c5e7070703126152b407070703000", 0xffffffffffffff9c}, 0x10) connect$l2tp(r8, &(0x7f00000005c0)=@pppol2tpv3={0x18, 0x1, {0x0, r8, {0x2, 0x4e22, @broadcast}, 0x1, 0x1, 0x4, 0x2}}, 0x2e) ioctl$KDDELIO(r8, 0x4b35, 0x36bf) 07:09:21 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x5, 0x101800) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000480)=0x8) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0xfffffea5) socketpair(0x7, 0x80003, 0x9, &(0x7f0000000580)={0xffffffffffffffff}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000006c0)={'rose0\x00', 0x2000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000500)=r2) socketpair(0x3, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x1, 0x2000000001, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000001f00bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f2000000b7050000230000006a0a00fe000000008500000036000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r7, 0x0, 0xe, 0xe, &(0x7f0000000380)="8e5712f9ec625ca6752406da588e", &(0x7f0000000600)=""/14}, 0x28) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x100000001, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}, 0x0, 0x0, 0x6}, 0x0, 0x0, r5, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x304) ioctl$TUNSETLINK(r5, 0x400454cd, 0xffff) close(r2) write$cgroup_int(r3, &(0x7f0000000640)=0x9, 0x12) openat$cgroup_int(r4, &(0x7f00000005c0)='cpuacct.usage\x00', 0x2, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x7, &(0x7f0000000840)=@raw=[@alu={0x7, 0x78, 0x6, 0xf, 0xb, 0x2, 0xfffffffffffffff0}, @generic={0x32d0, 0x7, 0x8001, 0x7, 0x1}, @call={0x85, 0x0, 0x0, 0x20}, @ldst={0x3, 0x3, 0x1, 0x2, 0x2, 0x86, 0xffffffffffffffff}, @map={0x18, 0x7, 0x1, 0x0, r5}, @ldst={0x2, 0x0, 0x7, 0xd, 0x6, 0xfffffffffffffff0, 0xfffffffffffffffc}, @map={0x18, 0xf, 0x1, 0x0, r8}, @exit, @generic={0xabd, 0x7, 0xffff0000000, 0x0, 0x8}], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x21, &(0x7f000000cf3d)=""/195, 0x0, 0x1}, 0x48) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x62) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r6, 0x0, 0x9, &(0x7f0000000280)='cpuacct.usage\x00', 0xffffffffffffffff}, 0xfffffd54) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x1, 0x1, 0xffff, 0x7, 0x0, 0x0, 0xc00, 0x6, 0x7, 0x3ff, 0x0, 0x7, 0x7, 0x9, 0x0, 0x6, 0x7bc, 0x0, 0x8001, 0x8, 0x74, 0x2, 0x4, 0x80, 0x6, 0x1000, 0x0, 0xc000000000000000, 0x7fffffff, 0x36, 0x2, 0x7ff, 0x0, 0x200, 0x100000001, 0xffffffffffffff7f, 0x0, 0xdab6, 0x0, @perf_bp={&(0x7f00000003c0), 0x8}, 0x4, 0x6f, 0x9, 0xfffffffffffffffe, 0x0, 0x0, 0x2}, r9, 0x2, r5, 0x8) close(r5) 07:09:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0xf5ffffff00000000) 07:09:22 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x7050000, 0x4000000000020011, r0, 0x0) 07:09:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xc01, &(0x7f0000000480)) 07:09:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x800000000000000, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:23 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x1000000) 07:09:23 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x2, r2}) connect$inet(r0, &(0x7f0000001700)={0x2, 0x4e23}, 0x10) fcntl$setstatus(r1, 0x4, 0x2400) sendto$inet(r1, &(0x7f00004eef09)="96", 0x1, 0x4001, 0x0, 0x0) 07:09:23 executing program 4: r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0xffc0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=@srh, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev, [0x0, 0x300000000000000]}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xf4010000, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}}, 0x0, 0x0, 0x0, 0x0, 0x84}, 0x98) 07:09:23 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/urandom\x00', 0x82, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0xee72) sendfile(r1, r2, &(0x7f0000000000), 0x8000fffffffe) 07:09:23 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x507) 07:09:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x536}], 0x1, &(0x7f0000001680)=""/72, 0x48}}], 0x1, 0x0, &(0x7f0000002240)) 07:09:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x200000000000000) 07:09:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x40, 0x0) 07:09:23 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x2) 07:09:23 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 07:09:23 executing program 0: msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/71}, 0x4f, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgsnd(0x0, &(0x7f0000000040)={0x1}, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000380)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 07:09:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x1000000, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x536}], 0x1, &(0x7f0000001680)=""/72, 0x48}}], 0x1, 0x0, &(0x7f0000002240)) 07:09:23 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x400000) 07:09:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x97ffffff) 07:09:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x536}], 0x1, &(0x7f0000001680)=""/72, 0x48}}], 0x1, 0x0, &(0x7f0000002240)) 07:09:24 executing program 0: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f00000000c0)="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", 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 07:09:24 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x1e00000000000000) 07:09:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x4000, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x536}], 0x1, &(0x7f0000001680)=""/72, 0x48}}], 0x1, 0x0, &(0x7f0000002240)) 07:09:24 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x8000000000000000) 07:09:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)="646374637000056ebc5901f6cbcd414ae37606b3d5fef67ace36e6306b72d5df31213f22e6c6955f62dda8db5d3bac1dbadb20566989373aa7071966f430afa932b7d921db9ed03a476512d9fb506001424eba69ba36aec456b47edb4804bc3f473977b9fda20603f2c1f88379e5abd6556aa8d601a6ff6c395186f282d7d11f62d651c94fc6a6c49eba4a54805006be83a6eafaf1b7d123a341874c7d91686ae43ccd62206e11a5558533fd2065d84ba133aeefd7cdb05633de55f27b8a00000000000000000000000000000000", 0xce) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") sendto$inet6(r0, &(0x7f0000000240)="db83a0e40cc657835edeb122e5c7d4e4c91e4bb6bd26990a7aa9854e04ee1453dafc3d14d966e94d5aab4c84e2e7aa348f6e84e3d99490f2c1bd3f9e66fea2ee09fcef18b8ec5424ecdc91ae5779d449a1a5e7b5cea7dcef40b7dc4a2311df31100ad1", 0x63, 0x20000004, 0x0, 0x0) 07:09:24 executing program 0: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 07:09:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x1000000000000000, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:24 executing program 3: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x81, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000380)={0x0, 0x1, 0x0, [], 0x0}) 07:09:24 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x1f000000) 07:09:24 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x4, 0x80) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x4e21}}) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000100)=0x8) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{}, {0x0}, {}]}) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000740)=0x100001d) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000780)={r3, &(0x7f0000000740)}) accept$inet(r2, &(0x7f0000000240)={0x2, 0x0, @multicast1}, &(0x7f0000000280)=0x10) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r4, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000200)) r5 = memfd_create(&(0x7f00000003c0)="72970ddb08df8c65969b0561bbb7d8b4f61c6f4f0e7070703078707031236d643573756d000000000000e18d00b6b68436c484d96348a9f8cdf9771104348f994b0597ccb73d5749f0b755d0306a2af5d25153e6623c5c10c499661e63958db5e8a9d821870c7e5898023604a48a15bb3254ad2343bca70c6350104475d31916cb80220b52118b70e37392fa62ec43eecdf6ecc1c49db4895bc4ab1df998f340275b6ef32b2e0a0aed6c4325a7923a3f83d6a18c67fe0d769819451aed3c11e2524e6a21231a9bd96339a1064fec8595c0b64eb72d00d8e10d3c0248622db258aa3c9673ff89b4d9ce615e9913586b99df11ebd7ad8213d1c14806b6a74f0a87c96f8ecf1a416207c562b91bb3898a2346961605e4b3ffb158828dd8dbaa9fafa2b7efce93de0d460050cfdc36598274c03eebc9ed5b19f33fb8daae6a0f91c7475d776695dade94c1da38", 0x0) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000180)='&', 0x1}], 0x1, 0x81003) sendfile(r0, r5, &(0x7f00000ddff8), 0x80000004) 07:09:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x536}], 0x1, &(0x7f0000001680)=""/72, 0x48}}], 0x1, 0x0, &(0x7f0000002240)) 07:09:24 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x40000000) 07:09:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x600) 07:09:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x3f00000000000000, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:24 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x4, 0x80) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x4e21}}) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000100)=0x8) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{}, {0x0}, {}]}) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000740)=0x100001d) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000780)={r3, &(0x7f0000000740)}) accept$inet(r2, &(0x7f0000000240)={0x2, 0x0, @multicast1}, &(0x7f0000000280)=0x10) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r4, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000200)) r5 = memfd_create(&(0x7f00000003c0)="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", 0x0) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000180)='&', 0x1}], 0x1, 0x81003) sendfile(r0, r5, &(0x7f00000ddff8), 0x80000004) 07:09:24 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x4) 07:09:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x8, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x536}], 0x1, &(0x7f0000001680)=""/72, 0x48}}], 0x1, 0x0, &(0x7f0000002240)) 07:09:25 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x4, 0x80) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x4e21}}) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000100)=0x8) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{}, {0x0}, {}]}) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000740)=0x100001d) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000780)={r3, &(0x7f0000000740)}) accept$inet(r2, &(0x7f0000000240)={0x2, 0x0, @multicast1}, &(0x7f0000000280)=0x10) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r4, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000200)) r5 = memfd_create(&(0x7f00000003c0)="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", 0x0) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000180)='&', 0x1}], 0x1, 0x81003) sendfile(r0, r5, &(0x7f00000ddff8), 0x80000004) 07:09:25 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x1f089000) 07:09:25 executing program 0: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 07:09:25 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x40000000, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008e80)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x536}], 0x1, &(0x7f0000001680)=""/72, 0x48}}], 0x1, 0x0, &(0x7f0000002240)) 07:09:25 executing program 3: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000006) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x301000, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000940)={0x1, [0x80000001]}, 0x6) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x8, 0x0, 0xffffffff, 0x0, 0x200, 0x0, 0x0, 0x0, 0x3553800000, 0x7f}) r2 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000340)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r3 = memfd_create(&(0x7f0000000c40)='bridge0\x00', 0x3) syz_open_dev$sndctrl(&(0x7f0000000880)='/dev/snd/controlC#\x00', 0x0, 0x101501) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000500)={&(0x7f00000006c0), 0xc, &(0x7f0000000540)={&(0x7f0000000740)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a00)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000640)=ANY=[@ANYBLOB="100000087e04004e200000140003040000000000000032205a4c7dd81c91"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$inet_opts(r3, 0x0, 0xd, &(0x7f0000000b40)="8f36be1ab89efdf54cb881f49ba3be6f5195c8c226397b30d3f0", 0x1a) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) execve(&(0x7f0000000600)='./file0\x00', &(0x7f0000000740), &(0x7f0000000800)=[&(0x7f0000000780)='/dev/ptmx\x00']) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x1, 'syz0\x00'}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000180), 0x0, [], [0x80000001, 0x0, 0x0, 0x401]}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/ashmem\x00', 0x490000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000009c0)={@loopback, 0x0, 0x0, 0xff, 0x0, 0x734a1d93}, 0x20) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000000480)={'bond_slave_0\x00', {0x2, 0x4e24, @empty}}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000980)={0x0, 0x7, 0x40}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000a80)={0xf040, 0x7f, 0x209, 0x6, 0x3, 0x3, 0xfa9, 0x8001, r6}, 0x20) r7 = accept(r5, &(0x7f0000000380)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000180)={0x165, 0x0, 0x7, 0x9, 0x0}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000680)={r8, 0x8}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f00000007c0)={0x1, 0x8008, 0x7, 0x10000, r9}, &(0x7f0000000840)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f0000000400)={r8, 0xcb7e}, &(0x7f0000000440)=0x8) [ 290.339805] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.351625] bridge0: port 1(bridge_slave_0) entered disabled state 07:09:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x3f00) 07:09:26 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x1e) 07:09:26 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x100000000000000, {0x0, 0x1, 0x0, 0x10}}, 0x30) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 07:09:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x536}], 0x1, &(0x7f0000001680)=""/72, 0x48}}], 0x1, 0x0, &(0x7f0000002240)) 07:09:26 executing program 0: bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) [ 291.230674] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.237148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.243899] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.250276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.262283] device bridge0 entered promiscuous mode [ 291.268304] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 07:09:26 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0xf8faffffffff0f00) 07:09:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000004080501ff0280fffdfffe2e0a0000000c0003002f006a007d0a00010c000200170022ff02f10000"], 0x2c}}, 0x0) 07:09:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x536}], 0x1, &(0x7f0000001680)=""/72, 0x48}}], 0x1, 0x0, &(0x7f0000002240)) 07:09:26 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x4000) [ 291.443585] netlink: 'syz-executor0': attribute type 3 has an invalid length. [ 291.466607] netlink: 'syz-executor0': attribute type 2 has an invalid length. [ 291.479500] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.486071] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.493422] WARNING: CPU: 1 PID: 9415 at net/netfilter/nfnetlink_cttimeout.c:478 cttimeout_default_get+0x1df/0xb30 [ 291.503965] Kernel panic - not syncing: panic_on_warn set ... [ 291.504523] kobject: '0:44' (0000000024f23961): kobject_uevent_env [ 291.509986] CPU: 1 PID: 9415 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 291.509995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.510001] Call Trace: [ 291.510021] dump_stack+0x244/0x39d [ 291.510041] ? dump_stack_print_info.cold.1+0x20/0x20 [ 291.523207] kobject: '0:44' (0000000024f23961): fill_kobj_path: path = '/devices/virtual/bdi/0:44' [ 291.524857] panic+0x2ad/0x55c [ 291.524875] ? add_taint.cold.5+0x16/0x16 [ 291.524897] ? __warn.cold.8+0x5/0x45 [ 291.536261] kobject: '0:45' (000000004b29f62b): kobject_cleanup, parent (null) [ 291.536834] ? cttimeout_default_get+0x1df/0xb30 [ 291.540644] kobject: '0:45' (000000004b29f62b): calling ktype release [ 291.545628] __warn.cold.8+0x20/0x45 [ 291.545643] ? rcu_softirq_qs+0x20/0x20 [ 291.545660] ? cttimeout_default_get+0x1df/0xb30 [ 291.545677] report_bug+0x254/0x2d0 [ 291.545698] do_error_trap+0x11b/0x200 [ 291.545732] do_invalid_op+0x36/0x40 [ 291.556675] kobject: '0:44' (0000000024f23961): kobject_cleanup, parent (null) [ 291.558011] ? cttimeout_default_get+0x1df/0xb30 [ 291.558047] invalid_op+0x14/0x20 [ 291.558063] RIP: 0010:cttimeout_default_get+0x1df/0xb30 [ 291.558081] Code: 00 0f 87 8d 00 00 00 41 80 ff 06 0f 84 94 07 00 00 41 80 ff 11 0f 84 6c 07 00 00 41 80 ff 01 0f 84 44 07 00 00 e8 11 e5 21 fb <0f> 0b 41 bd a1 ff ff ff eb 06 41 bd a1 ff ff ff e8 fc e4 21 fb 48 [ 291.562754] kobject: '0:44' (0000000024f23961): calling ktype release [ 291.566009] RSP: 0018:ffff88017a1e72b0 EFLAGS: 00010212 [ 291.566022] RAX: 0000000000040000 RBX: ffffffff88bfe400 RCX: ffffc90005dd5000 [ 291.566033] RDX: 0000000000015f3e RSI: ffffffff865dc39f RDI: 0000000000000001 [ 291.566043] RBP: ffff88017a1e73c0 R08: ffff88017a7e0440 R09: ffffed003b5e5b67 [ 291.566052] R10: 0000000000000002 R11: ffff8801daf2db3b R12: 000000000000002f [ 291.566062] R13: ffff8801c9688780 R14: 0000000000000017 R15: 000000000000002f [ 291.566089] ? cttimeout_default_get+0x1df/0xb30 [ 291.574842] kobject: '0:45': free name [ 291.579076] ? lock_downgrade+0x900/0x900 [ 291.579094] ? check_preemption_disabled+0x48/0x280 [ 291.579113] ? cttimeout_new_timeout+0x8c0/0x8c0 [ 291.579133] ? __lock_is_held+0xb5/0x140 [ 291.586259] kobject: '0:44': free name [ 291.589485] ? cttimeout_new_timeout+0x8c0/0x8c0 [ 291.589601] nfnetlink_rcv_msg+0xdd3/0x10c0 [ 291.589631] ? nfnetlink_bind+0x3b0/0x3b0 [ 291.598690] kobject: 'loop5' (00000000547815f5): kobject_uevent_env [ 291.601986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.608344] kobject: 'loop5' (00000000547815f5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 291.609609] ? refcount_sub_and_test_checked+0x203/0x310 [ 291.609632] ? refcount_dec_if_one+0x180/0x180 [ 291.609653] ? netlink_deliver_tap+0x32e/0xf80 [ 291.659610] device bridge0 left promiscuous mode [ 291.662354] ? lock_downgrade+0x900/0x900 [ 291.662371] ? check_preemption_disabled+0x48/0x280 [ 291.662396] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.662487] ? apparmor_capable+0x355/0x6c0 [ 291.662509] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.807747] ? apparmor_cred_transfer+0x590/0x590 [ 291.812610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.818168] netlink_rcv_skb+0x172/0x440 [ 291.822247] ? nfnetlink_bind+0x3b0/0x3b0 [ 291.826404] ? netlink_ack+0xb80/0xb80 [ 291.830382] ? __netlink_ns_capable+0x100/0x130 [ 291.835075] nfnetlink_rcv+0x1c0/0x4d0 [ 291.838975] ? nfnetlink_rcv_batch+0x19b0/0x19b0 [ 291.843770] ? kasan_check_write+0x14/0x20 [ 291.848040] netlink_unicast+0x5a5/0x760 [ 291.852117] ? netlink_attachskb+0x9a0/0x9a0 [ 291.856541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.862088] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 291.867123] netlink_sendmsg+0xa18/0xfc0 [ 291.871204] ? netlink_unicast+0x760/0x760 [ 291.875453] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 291.880399] ? apparmor_socket_sendmsg+0x29/0x30 [ 291.885163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.890713] ? security_socket_sendmsg+0x94/0xc0 [ 291.895497] ? netlink_unicast+0x760/0x760 [ 291.899824] sock_sendmsg+0xd5/0x120 [ 291.903559] ___sys_sendmsg+0x7fd/0x930 [ 291.907546] ? find_held_lock+0x36/0x1c0 [ 291.911624] ? copy_msghdr_from_user+0x580/0x580 [ 291.916410] ? __fd_install+0x2b5/0x8f0 [ 291.920409] ? __fget_light+0x2e9/0x430 [ 291.924402] ? fget_raw+0x20/0x20 [ 291.927876] ? __might_fault+0x12b/0x1e0 [ 291.931972] ? lock_downgrade+0x900/0x900 [ 291.936173] ? lock_release+0xa10/0xa10 [ 291.940155] ? perf_trace_sched_process_exec+0x860/0x860 07:09:27 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x507000, 0x0, 0x4000000000020011, r0, 0x1e000000) [ 291.944175] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.945674] ? posix_ktime_get_ts+0x15/0x20 [ 291.951983] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.956264] ? trace_hardirqs_off_caller+0x300/0x300 [ 291.956291] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 291.956305] ? sockfd_lookup_light+0xc5/0x160 [ 291.956323] __sys_sendmsg+0x11d/0x280 [ 291.963014] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.967998] ? __ia32_sys_shutdown+0x80/0x80 [ 291.973584] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.978008] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 291.988021] kobject: 'loop2' (000000007fc3a38b): kobject_uevent_env [ 291.988238] ? put_timespec64+0x10f/0x1b0 [ 291.992781] kobject: 'loop2' (000000007fc3a38b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 291.999077] ? do_syscall_64+0x9a/0x820 [ 291.999094] ? do_syscall_64+0x9a/0x820 [ 291.999122] ? trace_hardirqs_off_caller+0x300/0x300 [ 291.999152] __x64_sys_sendmsg+0x78/0xb0 [ 292.020731] device bridge0 entered promiscuous mode [ 292.024697] do_syscall_64+0x1b9/0x820 [ 292.024729] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.024749] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.024765] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.024784] ? trace_hardirqs_on_caller+0x310/0x310 [ 292.024802] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 292.024820] ? prepare_exit_to_usermode+0x291/0x3b0 [ 292.024841] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.030306] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 292.032795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.032809] RIP: 0033:0x457569 [ 292.032826] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.032835] RSP: 002b:00007f38e90bfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 292.032851] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 292.032860] RDX: 0000000000000000 RSI: 0000000020dddfc8 RDI: 0000000000000003 [ 292.032870] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 292.032880] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38e90c06d4 [ 292.032889] R13: 00000000004c3fea R14: 00000000004d6820 R15: 00000000ffffffff [ 292.038891] Kernel Offset: disabled [ 292.167553] Rebooting in 86400 seconds..