d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:12 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5004800", 0x2e}], 0x1}, 0x0) 03:37:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x400000, 0x0, 0x0, 0x0) 03:37:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:13 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5004c00", 0x2e}], 0x1}, 0x0) 03:37:13 executing program 4 (fault-call:6 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:13 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5006000", 0x2e}], 0x1}, 0x0) [ 593.673856] FAULT_INJECTION: forcing a failure. [ 593.673856] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 593.685725] CPU: 0 PID: 23678 Comm: syz-executor4 Not tainted 5.0.0-rc4+ #52 [ 593.692940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 593.702309] Call Trace: [ 593.704935] dump_stack+0x1db/0x2d0 [ 593.708583] ? dump_stack_print_info.cold+0x20/0x20 [ 593.713614] ? _kstrtoull+0x17d/0x250 [ 593.717444] should_fail.cold+0xa/0x15 [ 593.721357] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 593.726474] ? get_pid_task+0xd4/0x190 [ 593.730378] ? find_held_lock+0x35/0x120 [ 593.734458] ? get_pid_task+0xd4/0x190 [ 593.734483] ? add_lock_to_list.isra.0+0x450/0x450 [ 593.734500] ? kasan_check_read+0x11/0x20 [ 593.734519] should_fail_alloc_page+0x50/0x60 [ 593.743343] __alloc_pages_nodemask+0x323/0xdc0 [ 593.743368] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 593.743385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 593.743417] ? ___might_sleep+0x1e7/0x310 [ 593.743437] ? trace_hardirqs_off+0xb8/0x310 [ 593.743458] cache_grow_begin+0x9c/0x8c0 [ 593.743472] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 593.743489] ? check_preemption_disabled+0x48/0x290 [ 593.743509] kmem_cache_alloc+0x645/0x710 [ 593.743531] getname_flags+0xd6/0x5b0 [ 593.798448] user_path_at_empty+0x2f/0x50 [ 593.798469] path_listxattr+0xac/0x190 [ 593.798486] ? lockdep_hardirqs_on+0x415/0x5d0 [ 593.798503] ? listxattr+0x150/0x150 [ 593.798523] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 03:37:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x50a000, 0x0, 0x0, 0x0) [ 593.798541] ? trace_hardirqs_off_caller+0x300/0x300 [ 593.798561] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 593.806600] __x64_sys_llistxattr+0x75/0xb0 [ 593.806619] do_syscall_64+0x1a3/0x800 [ 593.806640] ? syscall_return_slowpath+0x5f0/0x5f0 [ 593.806659] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 593.806675] ? __switch_to_asm+0x34/0x70 [ 593.806697] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 593.806721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 593.806736] RIP: 0033:0x458089 [ 593.843338] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 593.843347] RSP: 002b:00007f7374bb7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000c3 [ 593.843362] RAX: ffffffffffffffda RBX: 00007f7374bb7c90 RCX: 0000000000458089 [ 593.843372] RDX: ffffffffffffff8c RSI: 0000000000000000 RDI: 00000000200000c0 [ 593.843381] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 593.843391] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7374bb86d4 [ 593.843400] R13: 00000000004c3c47 R14: 00000000004d6ac0 R15: 0000000000000004 03:37:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', 0x0, 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:13 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5006800", 0x2e}], 0x1}, 0x0) 03:37:13 executing program 4 (fault-call:6 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x6b6b6b, 0x0, 0x0, 0x0) 03:37:13 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5006c00", 0x2e}], 0x1}, 0x0) [ 594.151741] net_ratelimit: 14 callbacks suppressed [ 594.151750] protocol 88fb is buggy, dev hsr_slave_0 [ 594.161878] protocol 88fb is buggy, dev hsr_slave_1 [ 594.167063] protocol 88fb is buggy, dev hsr_slave_0 [ 594.172216] protocol 88fb is buggy, dev hsr_slave_1 [ 594.177355] protocol 88fb is buggy, dev hsr_slave_0 [ 594.182477] protocol 88fb is buggy, dev hsr_slave_1 03:37:13 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5007400", 0x2e}], 0x1}, 0x0) [ 594.298951] FAULT_INJECTION: forcing a failure. [ 594.298951] name failslab, interval 1, probability 0, space 0, times 0 [ 594.357576] CPU: 0 PID: 23709 Comm: syz-executor4 Not tainted 5.0.0-rc4+ #52 [ 594.364829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.374196] Call Trace: [ 594.376781] dump_stack+0x1db/0x2d0 [ 594.380402] ? dump_stack_print_info.cold+0x20/0x20 [ 594.385424] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 594.390956] ? rcu_pm_notify+0xd0/0xd0 [ 594.394852] should_fail.cold+0xa/0x15 [ 594.398759] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 594.403860] ? ___might_sleep+0x1e7/0x310 [ 594.407998] ? arch_local_save_flags+0x50/0x50 [ 594.412588] __should_failslab+0x121/0x190 [ 594.416854] should_failslab+0x9/0x14 [ 594.420666] kmem_cache_alloc_node_trace+0x270/0x720 [ 594.425767] ? digsig_verify.cold+0x32/0x32 [ 594.430095] ? kmem_cache_alloc+0x341/0x710 [ 594.434420] __kmalloc_node+0x3d/0x70 [ 594.438223] kvmalloc_node+0xbd/0x100 [ 594.442031] listxattr+0x56/0x150 [ 594.445488] path_listxattr+0xe6/0x190 [ 594.449369] ? lockdep_hardirqs_on+0x415/0x5d0 [ 594.453956] ? listxattr+0x150/0x150 [ 594.457678] ? trace_hardirqs_off_caller+0x300/0x300 [ 594.462792] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 594.467546] __x64_sys_llistxattr+0x75/0xb0 [ 594.471871] do_syscall_64+0x1a3/0x800 [ 594.475770] ? syscall_return_slowpath+0x5f0/0x5f0 [ 594.480711] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 594.485736] ? __switch_to_asm+0x34/0x70 [ 594.489897] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 594.494765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 594.499954] RIP: 0033:0x458089 [ 594.503197] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 594.522105] RSP: 002b:00007f7374bb7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000c3 [ 594.529822] RAX: ffffffffffffffda RBX: 00007f7374bb7c90 RCX: 0000000000458089 [ 594.537086] RDX: ffffffffffffff8c RSI: 0000000000000000 RDI: 00000000200000c0 [ 594.544348] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 594.551643] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7374bb86d4 [ 594.558914] R13: 00000000004c3c47 R14: 00000000004d6ac0 R15: 0000000000000004 03:37:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, 0x0, 0x0) 03:37:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x70a000, 0x0, 0x0, 0x0) 03:37:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:14 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5007a00", 0x2e}], 0x1}, 0x0) 03:37:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x713000, 0x0, 0x0, 0x0) 03:37:14 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500f000", 0x2e}], 0x1}, 0x0) 03:37:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:14 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000b01", 0x2e}], 0x1}, 0x0) 03:37:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x740000, 0x0, 0x0, 0x0) [ 595.031305] protocol 88fb is buggy, dev hsr_slave_0 [ 595.036444] protocol 88fb is buggy, dev hsr_slave_1 03:37:14 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000003", 0x2e}], 0x1}, 0x0) 03:37:14 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000005", 0x2e}], 0x1}, 0x0) 03:37:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, 0x0, 0x0) 03:37:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x8000a0, 0x0, 0x0, 0x0) 03:37:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:15 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000006", 0x2e}], 0x1}, 0x0) 03:37:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x2, 0x2, 0x968abd1, 0x9, r1}) 03:37:15 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000007", 0x2e}], 0x1}, 0x0) [ 595.750960] protocol 88fb is buggy, dev hsr_slave_0 [ 595.756100] protocol 88fb is buggy, dev hsr_slave_1 [ 595.845724] validate_nla: 16 callbacks suppressed [ 595.845731] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x80ffff, 0x0, 0x0, 0x0) 03:37:15 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500000a", 0x2e}], 0x1}, 0x0) [ 595.986133] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:15 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500010b", 0x2e}], 0x1}, 0x0) 03:37:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x940000, 0x0, 0x0, 0x0) 03:37:15 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500000e", 0x2e}], 0x1}, 0x0) [ 596.170212] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 596.188499] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 596.304889] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, 0x0, 0x0) 03:37:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xa05000, 0x0, 0x0, 0x0) 03:37:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:16 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500000f", 0x2e}], 0x1}, 0x0) 03:37:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000080)={{0x0, 0x3, 0x9, 0x6, 0x0, 0x3}, 0x9}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xa07000, 0x0, 0x0, 0x0) [ 596.639125] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:16 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000020", 0x2e}], 0x1}, 0x0) 03:37:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x1000000, 0x0, 0x0, 0x0) 03:37:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000480)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x60000, &(0x7f0000000680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0x9}}], [{@audit='audit'}, {@obj_role={'obj_role'}}, {@fsuuid={'fsuuid', 0x3d, {[0x67, 0x35, 0x38, 0x37, 0x0, 0x7f, 0x77, 0x76], 0x2d, [0x3e, 0x34, 0x76, 0x66], 0x2d, [0x79, 0x63, 0x35, 0x7f], 0x2d, [0x39, 0x0, 0x77, 0x73], 0x2d, [0x0, 0x77, 0x33, 0x32, 0x34, 0x0, 0x39, 0x65]}}}, {@euid_eq={'euid', 0x3d, r3}}]}}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 596.902822] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:16 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500003f", 0x2e}], 0x1}, 0x0) 03:37:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x1000040, 0x0, 0x0, 0x0) [ 597.089301] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18}, 0x18) 03:37:16 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000048", 0x2e}], 0x1}, 0x0) [ 597.394255] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2, 0x100) getpeername$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c) 03:37:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x1000080, 0x0, 0x0, 0x0) 03:37:17 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500004c", 0x2e}], 0x1}, 0x0) [ 597.546628] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, 0x0, 0x0) 03:37:17 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000060", 0x2e}], 0x1}, 0x0) 03:37:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x10000c0, 0x0, 0x0, 0x0) 03:37:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:17 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000068", 0x2e}], 0x1}, 0x0) 03:37:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x1010000, 0x0, 0x0, 0x0) 03:37:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18}, 0x18) 03:37:17 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500006c", 0x2e}], 0x1}, 0x0) 03:37:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) read$FUSE(r0, &(0x7f0000000480), 0x1000) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) r1 = dup(r0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000040)="abc3665ce6ab407fe7e8f2a96f74221eb03ee86d107b37b633518331d586310210b23df6531bffe1ebdc6f86600537265594a36ea7bbcc") write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x2000000, 0x0, 0x0, 0x0) 03:37:17 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000074", 0x2e}], 0x1}, 0x0) 03:37:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, 0x0, 0x0) 03:37:18 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500007a", 0x2e}], 0x1}, 0x0) 03:37:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x4000000, 0x0, 0x0, 0x0) 03:37:18 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c50000f0", 0x2e}], 0x1}, 0x0) 03:37:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x5000000, 0x0, 0x0, 0x0) 03:37:18 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000040", 0x2e}], 0x1}, 0x0) 03:37:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18}, 0x18) 03:37:18 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000003", 0x2e}], 0x1}, 0x0) [ 599.189215] net_ratelimit: 16 callbacks suppressed [ 599.189224] protocol 88fb is buggy, dev hsr_slave_0 [ 599.199384] protocol 88fb is buggy, dev hsr_slave_1 03:37:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x6000000, 0x0, 0x0, 0x0) 03:37:18 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500ffff", 0x2e}], 0x1}, 0x0) 03:37:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, 0x0, 0x0) 03:37:19 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x7000000, 0x0, 0x0, 0x0) 03:37:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1b, 0x2, 0xfffffffffffffff7, 0x3, 0x20, 0xffffffffffffff9c, 0x5}, 0x2c) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) alarm(0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000140)) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:19 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x7000080, 0x0, 0x0, 0x0) [ 599.908854] protocol 88fb is buggy, dev hsr_slave_0 [ 599.914034] protocol 88fb is buggy, dev hsr_slave_1 03:37:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x8000080, 0x0, 0x0, 0x0) 03:37:19 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:19 executing program 3 (fault-call:9 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:19 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 600.388685] protocol 88fb is buggy, dev hsr_slave_0 [ 600.393915] protocol 88fb is buggy, dev hsr_slave_1 [ 600.399158] protocol 88fb is buggy, dev hsr_slave_0 [ 600.404261] protocol 88fb is buggy, dev hsr_slave_1 [ 600.409501] protocol 88fb is buggy, dev hsr_slave_0 [ 600.414593] protocol 88fb is buggy, dev hsr_slave_1 [ 600.444309] FAULT_INJECTION: forcing a failure. [ 600.444309] name failslab, interval 1, probability 0, space 0, times 0 [ 600.464888] CPU: 0 PID: 24039 Comm: syz-executor3 Not tainted 5.0.0-rc4+ #52 [ 600.472144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 600.481516] Call Trace: [ 600.481547] dump_stack+0x1db/0x2d0 [ 600.481567] ? dump_stack_print_info.cold+0x20/0x20 [ 600.481585] ? __f_unlock_pos+0x19/0x20 [ 600.481609] should_fail.cold+0xa/0x15 [ 600.481632] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 600.481658] ? ___might_sleep+0x1e7/0x310 [ 600.481675] ? arch_local_save_flags+0x50/0x50 [ 600.481694] ? vfs_write+0x2f0/0x580 [ 600.481719] __should_failslab+0x121/0x190 [ 600.481742] should_failslab+0x9/0x14 [ 600.481760] kmem_cache_alloc+0x2be/0x710 [ 600.493286] ? check_preemption_disabled+0x48/0x290 [ 600.493308] getname_flags+0xd6/0x5b0 [ 600.539606] user_path_at_empty+0x2f/0x50 [ 600.543769] path_listxattr+0xac/0x190 [ 600.547668] ? lockdep_hardirqs_on+0x415/0x5d0 [ 600.552265] ? listxattr+0x150/0x150 [ 600.555990] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 600.561390] ? trace_hardirqs_off_caller+0x300/0x300 [ 600.566496] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 600.571251] __x64_sys_llistxattr+0x75/0xb0 [ 600.575928] do_syscall_64+0x1a3/0x800 [ 600.579818] ? syscall_return_slowpath+0x5f0/0x5f0 [ 600.584745] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 600.589766] ? __switch_to_asm+0x34/0x70 [ 600.593831] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 600.598686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 600.603868] RIP: 0033:0x458089 [ 600.607051] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 600.625947] RSP: 002b:00007f0cbe170c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000c3 [ 600.633644] RAX: ffffffffffffffda RBX: 00007f0cbe170c90 RCX: 0000000000458089 03:37:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18}, 0x18) 03:37:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x9000000, 0x0, 0x0, 0x0) 03:37:20 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 600.640944] RDX: ffffffffffffff8c RSI: 0000000000000000 RDI: 00000000200000c0 [ 600.648206] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 600.655464] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0cbe1716d4 [ 600.662725] R13: 00000000004c3c47 R14: 00000000004d6ac0 R15: 0000000000000005 03:37:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:20 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030301e30303034303030302c757365725f69643ddbbfe263419107d54f44120eadde5204fcdaa2ee52da527aa27ad0baff8681b29dbb66a0ceb1ca18aaa02038641d17d600e9a468c3dcac1b0d15b9d4a28e24c26fe1456418aae1bbecfa5ac7a14a81eb9872470938617c9147a3a9c7bf8b1135af5e95031a88f4d6898901c53b789d91d7513cd2318bc122171c3bd41ce9f4c8b02a7e18a05afab84e8d96f53c", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xa000000, 0x0, 0x0, 0x0) [ 600.925652] validate_nla: 20 callbacks suppressed [ 600.925662] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:20 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 601.057984] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="6a873d46506c1c277c71cc9d82af0748a97f2f7aa493e8718617fae0f44d6bc8ad54ac23ff4b4d6d521c7726567cceda6b1706139b92c6dec4cde77e865442b300be53ee4595f23b44ba1c56677ca505638a9ca3a8d5be8f8c5752e8876d38efa8c1e4a062168c1d980973705da94e61b14eb047a4e2145a96880bd7043431e4e957274b3ac922e52d9db025320d78d55fbe73e79233cedaa9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:20 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xb000000, 0x0, 0x0, 0x0) [ 601.273413] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18}, 0x18) 03:37:21 executing program 3 (fault-call:9 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xd000000, 0x0, 0x0, 0x0) 03:37:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) socket$rxrpc(0x21, 0x2, 0x2) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:21 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 601.694994] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 601.743347] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 601.763621] FAULT_INJECTION: forcing a failure. [ 601.763621] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 601.775498] CPU: 0 PID: 24102 Comm: syz-executor3 Not tainted 5.0.0-rc4+ #52 [ 601.782699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 601.792064] Call Trace: [ 601.792092] dump_stack+0x1db/0x2d0 [ 601.792115] ? dump_stack_print_info.cold+0x20/0x20 [ 601.792132] ? _kstrtoull+0x17d/0x250 [ 601.792158] should_fail.cold+0xa/0x15 [ 601.792187] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 601.792211] ? get_pid_task+0xd4/0x190 [ 601.798421] ? find_held_lock+0x35/0x120 [ 601.798440] ? get_pid_task+0xd4/0x190 [ 601.798462] ? add_lock_to_list.isra.0+0x450/0x450 [ 601.798478] ? kasan_check_read+0x11/0x20 [ 601.798497] should_fail_alloc_page+0x50/0x60 03:37:21 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 601.798517] __alloc_pages_nodemask+0x323/0xdc0 [ 601.811218] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 601.811236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 601.811265] ? ___might_sleep+0x1e7/0x310 [ 601.820245] ? trace_hardirqs_off+0xb8/0x310 [ 601.820271] cache_grow_begin+0x9c/0x8c0 [ 601.828221] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 601.828240] ? check_preemption_disabled+0x48/0x290 [ 601.828262] kmem_cache_alloc+0x645/0x710 [ 601.828285] getname_flags+0xd6/0x5b0 [ 601.828304] user_path_at_empty+0x2f/0x50 [ 601.828322] path_listxattr+0xac/0x190 [ 601.828338] ? lockdep_hardirqs_on+0x415/0x5d0 [ 601.828353] ? listxattr+0x150/0x150 [ 601.828372] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 601.828391] ? trace_hardirqs_off_caller+0x300/0x300 [ 601.837484] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 601.861364] __x64_sys_llistxattr+0x75/0xb0 [ 601.861386] do_syscall_64+0x1a3/0x800 [ 601.861405] ? syscall_return_slowpath+0x5f0/0x5f0 [ 601.861423] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 601.869941] ? __switch_to_asm+0x34/0x70 [ 601.869967] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 601.869992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 601.870010] RIP: 0033:0x458089 [ 601.880560] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 601.880568] RSP: 002b:00007f0cbe170c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000c3 [ 601.880582] RAX: ffffffffffffffda RBX: 00007f0cbe170c90 RCX: 0000000000458089 03:37:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18}, 0x18) 03:37:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x14000000, 0x0, 0x0, 0x0) [ 601.880590] RDX: ffffffffffffff8c RSI: 0000000000000000 RDI: 00000000200000c0 [ 601.880599] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 601.880608] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0cbe1716d4 [ 601.880617] R13: 00000000004c3c47 R14: 00000000004d6ac0 R15: 0000000000000005 [ 602.080241] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030050000000000000065725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x111) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0xb2, 0x81, 0x4, 0x85, 0x140000000000, 0x400, 0x6, 0x95, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={r2, 0x1, 0x7, 0xffff, 0x7fffffff, 0x5}, 0x14) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:21 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x19000080, 0x0, 0x0, 0x0) [ 602.281970] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:21 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101000, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000080)=@fragment={0x16, 0x0, 0x3f, 0x0, 0x0, 0x1, 0x67}, 0x8) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00daa966976d38594f99ba18f8cb9fcdf228afade9592bcf4ac272e898a69aaf852e46b9aeda2a8682627df8611c4e9cc52d364c59b5002218058084faac2240e7ff0c607c98435aa375eef6a9dd0aa38711785f6f7432c90ccc1c"]) read$FUSE(r1, &(0x7f00000040c0), 0x1000) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000340)={0x0, @bt={0x7ff, 0x0, 0x1, 0x2, 0x200, 0x7, 0x5, 0x8, 0xfffffffffffffffd, 0x20, 0xffffffffffff7fff, 0x7, 0xc00000, 0x10001, 0x0, 0x21}}) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000180)={0x2f, 0x4, 0x0, {0x6, 0xe2, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x1a000080, 0x0, 0x0, 0x0) [ 602.463658] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 602.496483] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:22 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:22 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 602.695608] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) getxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)=@known='system.advise\x00', &(0x7f0000000340)=""/182, 0xb6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x20040, 0x0) getsockopt$nfc_llcp(r2, 0x118, 0x0, 0x0, 0xffffff56) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x1d000080, 0x0, 0x0, 0x0) 03:37:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000140)={0x1, 0x2, 'client0\x00', 0x3, "653dfeb6a2b5fc02", "aa444a7dd39b40f2094fb404d609fe1dde0d3e563de02e0450ac5a56e9ffb562", 0x8, 0x1f}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fcntl$getown(r0, 0x9) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000080)) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0xfffffffffffffe19, 0x0, 0x2, {0x7f}}, 0x18) 03:37:22 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:22 executing program 0 (fault-call:7 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x20000000, 0x0, 0x0, 0x0) 03:37:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="22a7293fcedd1aef986034705f341cee308a02796c37f0965dfbb50d05cb046ce2295963f1ab886f29bf011cd63239976b1061c9e010b2a204af7526ed0e29439971f995fece351de2a96f02eb089d123315c2717e5b8347bdf69e99e5944238f43f5a29b684bafb393f780000f4fe0c3452f5016b6c67bcfcff000000000000"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$binfmt_misc(r0, &(0x7f0000000140)={'syz1', "ca84be20798bcdbf702a3fc4d69a7e58f6c1ef8df955bcb525fa7632a7185611b48014a130a2199c357007c20948f1f14fa0ec44d1cdeef9923cae329e610fdd9aef5a6863269658f6447ede87a3db41973dc1e8385e46c3da753a931aeb6526e8cde600b69650830fd84bb3ac3d3e28d7d9c9e6f4f4e58dccaf31b2feea2154460ff55ece2a53616bc48b0410db9ac32a42af1d16e1ae9d407e1c"}, 0x9f) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x6, 0x40) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:22 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x3f000000, 0x0, 0x0, 0x0) 03:37:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = accept4$rose(0xffffffffffffffff, &(0x7f0000000080)=@full={0xb, @remote, @bcast, 0x0, [@rose, @remote, @bcast, @netrom, @bcast, @default]}, &(0x7f0000000140)=0x40, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) epoll_create1(0x80000) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x20103, 0x0) getsockopt$nfc_llcp(r3, 0x118, 0xfffffffffffffffd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000340)={0x9, 0x400, 0x6}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x82, {0x7, 0x0, 0x0, 0x408000000000000}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:23 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:23 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x40000000, 0x0, 0x0, 0x0) 03:37:23 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0xf, 0x0, 0x4}, 0x18) 03:37:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="6ce7726f750ee9913c3d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:23 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="cfc2f20038eb11778c069c80efd03499bd1df80a1af52e0bf0ea53c0d0ac29841d6d191afca8de", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d17c196712e651d560a5f307a5e97b99d6105568fc42f4f5eae6314ed", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000004c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x9, 0x0, 0x1, 0x3fff8000000000, 'syz1\x00', 0xffffffffffffc1ff}) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) mount$9p_tcp(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x38809, &(0x7f00000014c0)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@cache_none='cache=none'}, {@access_any='access=any'}, {@privport='privport'}, {@fscache='fscache'}, {@loose='loose'}], [{@context={'context', 0x3d, 'staff_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x34, 0x65, 0x36, 0x63, 0x63, 0x7f, 0x65], 0x2d, [0x37, 0x33, 0x31, 0x3d], 0x2d, [0x35, 0x0, 0x77, 0x62], 0x2d, [0x66, 0x32, 0x77, 0x38], 0x2d, [0x3e, 0x34, 0x36, 0x73, 0x31, 0x7e, 0x74, 0x37]}}}, {@fsuuid={'fsuuid', 0x3d, {[0x7f, 0x0, 0x31, 0x32, 0x37, 0x66, 0x32, 0x77], 0x2d, [0x61, 0x61, 0x33, 0x34], 0x2d, [0x0, 0x32, 0x72, 0x7f], 0x2d, [0x33, 0x37, 0x3f, 0x38], 0x2d, [0x64, 0x30, 0x37, 0x65, 0x66, 0x66, 0x77, 0x77]}}}]}}) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000340)="025497143f10172d99934ff4cae1dde621b749938fda72bcac85985f952e7c6d28b7af7d0196f697262678b5dd320e967f1d2a2f319abacff178df3de606655ff062c7e95563d1839e5b556ae32d410c166f034013c68f9b7f2ff96c8d0e25f160679dd7f0cf86247bfd17f6681a3761c856f1fc1e9f76812cc18beb0214cc17ac6c8b7989725d3f3b0da9f3585fbce1bd3134", 0x93}], 0x1, 0x0) 03:37:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x40000001, 0x0, 0x0, 0x0) 03:37:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$TCXONC(r2, 0x540a, 0xaeea) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x7f) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$SIOCAX25DELFWD(r3, 0x89eb, &(0x7f0000000180)={@default, @default}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x0, {0x3}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:24 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303017303050303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x104) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={@empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @remote, 0x9, 0x8001, 0x0, 0x500, 0x0, 0x2020000, r2}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 604.546530] net_ratelimit: 14 callbacks suppressed [ 604.546539] protocol 88fb is buggy, dev hsr_slave_0 [ 604.556732] protocol 88fb is buggy, dev hsr_slave_1 [ 604.561882] protocol 88fb is buggy, dev hsr_slave_0 [ 604.567018] protocol 88fb is buggy, dev hsr_slave_1 [ 604.572193] protocol 88fb is buggy, dev hsr_slave_0 [ 604.577534] protocol 88fb is buggy, dev hsr_slave_1 03:37:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x50000000, 0x0, 0x0, 0x0) 03:37:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x0, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:24 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_LSEEK(r0, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, 0x1, {0x4a6d}}, 0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x6b6b6b00, 0x0, 0x0, 0x0) 03:37:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x10, 0x0, 0x4}, 0x18) 03:37:24 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500ffff", 0x2e}], 0x1}, 0x0) 03:37:24 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500ffff", 0x2e}], 0x1}, 0x0) 03:37:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0x71, "59d842064d77710fc7ffbeb224e2ac90c14210215b9deffa2e133a153384bbaa8c921dd7382c63e10c63de842c5b707a861c3c6119a51288ecd55874b58919a8f0193b2b916ad7ce8378f02767653d6d3732905f3f60fc4bf3305293946243772501da3b074495052efea07d68e4dbf880"}, &(0x7f0000000080)=0x79) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0x80000001, 0x9, 0x8001, 0xfffffffffffffffe, 0x4, 0x5, 0x9, 0x0, r2}, 0x20) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x8, 0x4000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x38, r4, 0x200, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x4101, 0x0, {0x1c, 0x17, {0x1a, 0x4, @l2={'ib', 0x3a, 'team_slave_1\x00'}}}}, ["", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x81}, 0x4) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x40000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000600000010000340140000000000000037153e370000000000000000d1bd", 0x2e}], 0x1}, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x80000007, 0x0, 0x0, 0x0) 03:37:25 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c50000f0", 0x2e}], 0x1}, 0x0) [ 605.426096] protocol 88fb is buggy, dev hsr_slave_0 [ 605.431238] protocol 88fb is buggy, dev hsr_slave_1 03:37:25 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5007fff", 0x2e}], 0x1}, 0x0) 03:37:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x0, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x80000008, 0x0, 0x0, 0x0) 03:37:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8001, 0x1) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x94, "28ec65c0c67b968931516ee00e7ccdf2f021dffa4bce33db105de674807ac9fce95ebdef512c800e3ed5b6abe41f0418d63267b1c4e37ed65a1f3c869a29aeb829b5292033754033915683a885be2bdf213d2ba8b0c5dd9c5b3237623ff2cec19fe011090d890516324acf9e2e5ca89b1c97091916bc607cd994a06d4a550a0709bbaa400724d12b46451e079f3ba36129c66b97"}, &(0x7f0000000080)=0x9c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e24, 0x3ff, @dev={0xfe, 0x80, [], 0x19}, 0x4af}}, 0x2, 0x8, 0x1, 0xff, 0x1}, 0x98) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:25 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5009eff", 0x2e}], 0x1}, 0x0) [ 606.026902] validate_nla: 15 callbacks suppressed [ 606.026926] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x200002d8, 0x0, 0x4}, 0x18) 03:37:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c01040000000000001a"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000340)={0x0, 0x2}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={r2, 0xf62, 0x10}, 0xc) read$FUSE(r0, &(0x7f0000002000), 0x1000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x20901, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r4, 0xc038563c, &(0x7f00000001c0)={0x0, 0x0, {0x4, 0x8, 0xfffffffffffffff9, 0xc891}}) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) ioctl$VIDIOC_SUBSCRIBE_EVENT(r4, 0x4020565a, &(0x7f0000000400)={0x1, 0x101, 0x2}) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:25 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500f0ff", 0x2e}], 0x1}, 0x0) 03:37:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x80000019, 0x0, 0x0, 0x0) [ 606.145774] protocol 88fb is buggy, dev hsr_slave_0 [ 606.151000] protocol 88fb is buggy, dev hsr_slave_1 03:37:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000300), 0xbdd) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 606.290512] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 606.317099] Unknown ioctl -1070049732 [ 606.338619] Unknown ioctl 1075861082 03:37:25 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 606.390109] Unknown ioctl -1070049732 [ 606.403553] Unknown ioctl 1075861082 03:37:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) exit_group(0x5) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x8000001a, 0x0, 0x0, 0x0) [ 606.539623] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 606.564103] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x0, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="8a8e62a55551a1cc473a49d988a38fe770a0f14d4a58e92cf3cb095c992827619877f842af044fdacdff69272768a772c40a49389da1a9ea755b8886e3f014360a96780931c5ad274acc4380", 0x4c) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:26 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500ffff", 0x2e}], 0x1}, 0x0) 03:37:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x8000001d, 0x0, 0x0, 0x0) [ 606.953732] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x8, 0x4}, 0x18) 03:37:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="d60258b24a6ef505055261e7ddc950aa4c1716f6837d98ebe827df4065c2861c365841be81cfb7607021581896986d62909a6395935eb6ea7a383ef1021d0afc5ffe87ed1d08b4a82e", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) vmsplice(r0, &(0x7f0000000480)=[{&(0x7f0000000040)="b32046886cc16c6464a9dfd70bfd0de02b59e9bb09cf6145", 0x18}, {&(0x7f0000000080)="9c9de6acbbda7f4b7c", 0x9}, {&(0x7f0000000140)="e1f894734637d32dfd34d9533f9db6b3b29a7e9e180227aae84f98c1ef7b445f3a6c100595f0db4dd23b72798b9606166237984ccbd28814be6d026d8b", 0x3d}, {&(0x7f0000000180)="0fca782fcb65bc45ca6c1ba35b97f2ffd67fefa07ab6607b366f84f5fe22ce6d5f6fe91af95bfa76f67828c3c421fec5ed51ca934c5dc42d90456f8e136c46f1b42abef1c5cdd152299df91673b72c43ef4767a3aa523c49e6ba9c465632c6dffccb3e135261103252bda3", 0x6b}, {&(0x7f0000000280)="4c4b41269d2e94eaf8bf3d9f", 0xc}], 0x5, 0xd) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$usb(&(0x7f0000000500)='/dev/bus/usb/00#/00#\x00', 0x4752, 0x101000) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) ioctl(r1, 0x1000008912, &(0x7f0000000340)="030000003c12a41d88b070a1b4f1ddcb4c7e8c56e2567517594a4780a3cd26d8e3a0d130ea84cf1ed6ccee5fe92ecd98695e0a8cadc8e623b7974ec0935fd2991d250734f1cefefff261e487505a69667e342a40e12fb550981198b95484fb92b084651c389162cb562b70f97e8e5f6baa418075c0fc1ac5e98bcbbb5a04694889f8975ae5efc7d0b5db4a7818") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:26 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xa0008000, 0x0, 0x0, 0x0) 03:37:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x1, 0x0) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfc, 0x100}, 0xc) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 607.274288] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 607.295389] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0xfffffffffffffffd, 0x0, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:26 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xc0000000, 0x0, 0x0, 0x0) [ 607.487016] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:27 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xc0000001, 0x0, 0x0, 0x0) 03:37:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000140)={{0x2, 0x4e21, @empty}, {0x7, @random="59d828a5f569"}, 0x8, {0x2, 0x4e21, @local}, 'bond_slave_0\x00'}) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 607.853875] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x10, 0x4}, 0x18) 03:37:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="6610fc73217759542c4c55f1e77184075ac9101ee411", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643dd166ed0ff76cd999ae36176ae73fd79c789e574783a637acb1c38f36813a2020715f21ba94784bfa8fa6ae696f22af985ac7892df11ce37f5c2d0fbcf82f76f2f61bcc73e48ae7331797cda1fce74fc4728bbb13ba6ac1296d83e7546f5b933606847dcc34b4a8396a5e5724ccdf0421da0198d780d57fd220ad907b00e2e19992", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x200000, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2e}}], [{@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}}) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000140)={0xc4c1}, 0x1) 03:37:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\t\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) 03:37:27 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xf6ffffff, 0x0, 0x0, 0x0) 03:37:27 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:28 executing program 4: r0 = open(&(0x7f0000000600)='./file0\x00', 0x8800, 0x21) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000a00)=""/4096) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="5bc9"]) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/mixer\x00', 0x20fffe, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000580)=0x3, 0x4) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) read$FUSE(r2, &(0x7f0000003000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() fstat(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='fuse\x00', 0x440, &(0x7f00000007c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=r3, @ANYBLOB="4067736fa1b7dbb7973cc326fa18b976baaf2457c530810d5a680481a6fa020457fef62754f7aab573e8ed343f1493c439e1674a20b000c785810315b3cef79875343b546c38a08f08000000cf5364c93c3f28cc0cda8ffd50983c1dac24c3096423c3374a041c5e2c64ea6f1bba7b0000000000000000", @ANYRESDEC=r4, @ANYBLOB=',default_permissions,blksize=0x0000000000000200,allow_other,allow_other,max_read=0x0000000000000006,allow_other,default_permissions,default_permissions,allow_other,euid=', @ANYRESDEC=r5, @ANYBLOB=',fowner>', @ANYRESDEC=r6, @ANYBLOB=',fsname=lo,smackfsfloor=fd,smackfsfloor=fd,dont_measure,smackfstransmute=#,\x00']) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) syz_extract_tcp_res(&(0x7f00000003c0), 0x7, 0x6) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f00000005c0)={0x3f, 0x6d7, 0xd}) 03:37:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c83726f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x20040, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000480)={0x0, "712604b1438dfcf41f551dc025c31693eb5e378a8acb69c46331ccf513b1b60e", 0x1, 0x1}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x18000, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e20, @loopback}}}, &(0x7f0000000280)=0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000340)={r3, 0x4}, &(0x7f0000000380)=0x8) read$FUSE(r0, &(0x7f0000002000), 0x1000) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xfcfdffff, 0x0, 0x0, 0x0) [ 608.567637] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) [ 608.638081] QAT: Invalid ioctl [ 608.654252] QAT: Invalid ioctl 03:37:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x3f00, 0x4}, 0x18) 03:37:28 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x20000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8008}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)={0x150, 0x27, 0x0, 0x70bd29, 0x25dfdbfb, {0x10}, [@nested={0xb8, 0x37, [@generic="83d45f464da42a6658d4c6253165de5269fb0f894d6ea240c7a65535c720d1ffe3bf9d4787daa52e5ea007d6fe956d8da671c8ebf49e18265c34f3f5b1643d699502e6d372307739df58adc36a3618b314fa7367dcb15a017d099a1bf35acbc7382ec2e96b045e4028b09d12ecbe1f13df3453fc8cb02ff5f762557e5c6752371ebbcc14612f3a7f2dc137b6aebfff125f1c97c62c433eedbd69377ef0e423c172c12a902493fb4a6a232ac00edbc53ec6"]}, @typed={0x8, 0x67, @u32=0x8f4c}, @typed={0x8, 0x4, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="bac9e1bfdb50f5197b5ca2a22bddbe38dc5657788915e86779f7729fc5ae610bfdab4bbc6809978e67285d67248870077f46df999f94784a8c9ecde101c431bcbfe5e23449e55ab4bd6cc93a6550ea5e13c5f02d91a89a905c1028af2735472e7cf9310eb8a11780803a7a92f53c407c26e14a36"]}, 0x150}, 0x1, 0x0, 0x0, 0x91}, 0x4000084) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) write$P9_RREMOVE(r2, &(0x7f0000000140)={0x7, 0x7b, 0x2}, 0x7) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xfdfdffff, 0x0, 0x0, 0x0) 03:37:28 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/qat_adf_ctl\x00', 0x100, 0x0) sendmsg$can_raw(r1, &(0x7f0000001600)={&(0x7f0000001500), 0x10, &(0x7f0000000140)={&(0x7f0000001540)=@canfd={{0x0, 0xc4, 0x3, 0x8}, 0xa, 0x2, 0x0, 0x0, "81dbc2072b16613d0b79ce7e413a2b00506bbf0c86e0cc76f91186cb0c54cea5e37823cdfb8c022b615099eb1c2b204e59f8f13babde08843aa84fd6639d8292"}, 0x19}, 0x1, 0x0, 0x0, 0x8000}, 0x4004000) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f0000000040)=0x2) ioctl$RTC_UIE_OFF(r1, 0x7004) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x9) 03:37:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xff600000, 0x0, 0x0, 0x0) 03:37:29 executing program 3: io_setup(0x5, &(0x7f00000000c0)=0x0) io_destroy(r0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=']\x00', @ANYRESDEC=0x0, @ANYBLOB="dc9918eb9ea9a6808fd0bc264a0e9646befecd248336fc70323fdb5af29014a7fb5680d27e0b0e754afad0eab02b63c6d9966bd06f085e7795a7b21fa46da4b92c524ab004000000000000007c3fd09a7814cf0d4d19e5e78070a6fc1f9a8640f88843e7ac9d5415f08d0800000007b3ac699c9fc9ad2496bb112d74dd58a18fe9411d7c39f28af747f61c9b17f772009ed356526004d7d9df51b9869c6600000000000000"]) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x300, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001480)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) recvfrom$packet(r3, &(0x7f0000000480)=""/4096, 0x1000, 0x10000, &(0x7f0000000280)={0x11, 0x1b, r4, 0x1, 0x1, 0x6, @broadcast}, 0x14) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0xd3ea9ef119ae41f6) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x7}, 0x18) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 03:37:29 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 609.584036] net_ratelimit: 16 callbacks suppressed [ 609.584045] protocol 88fb is buggy, dev hsr_slave_0 [ 609.594224] protocol 88fb is buggy, dev hsr_slave_1 [ 609.730020] QAT: Invalid ioctl [ 609.757887] QAT: Invalid ioctl [ 609.815155] QAT: Invalid ioctl [ 609.845204] QAT: Invalid ioctl [ 609.848745] QAT: Invalid ioctl [ 609.894402] QAT: Invalid ioctl 03:37:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x4000, 0x4}, 0x18) 03:37:29 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x900, 0x0) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000140)) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xffff8000, 0x0, 0x0, 0x0) 03:37:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) flistxattr(r0, &(0x7f0000000480)=""/198, 0xc6) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:29 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 610.303690] protocol 88fb is buggy, dev hsr_slave_0 [ 610.308938] protocol 88fb is buggy, dev hsr_slave_1 03:37:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="128d05ee4fdbb36015d1ab9672cdf47a20ce8e41db2802e10792d4204ceb748ac6083d659368d0c03ea9e7df3b5d5162a5736f7153825186a1818d255f3d9bfb23d14e434177c94600463559082536d2911d0e3f23a226828d1f73c2354bd93dbd798b6f7bc730560ea4b4601c9c5c454779399bc6ecab37d6dbbf023d63b2fc81ddba3ed5cdb2a221bec975943060cb2627f1174f420b3075ea3201e7199ced3222c3b2b93fdffd63ea2075ee0b09b792be4eac3e6a071af3aeb8e9f56e4180f75847704fa01ccbbad9b51d9bf535fc4b7e0cca17b8e36b"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) fcntl$getown(r0, 0x9) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) fcntl$getown(r0, 0x9) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xfffffdfc, 0x0, 0x0, 0x0) 03:37:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:30 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 610.793418] protocol 88fb is buggy, dev hsr_slave_0 [ 610.798869] protocol 88fb is buggy, dev hsr_slave_1 [ 610.804133] protocol 88fb is buggy, dev hsr_slave_0 [ 610.809244] protocol 88fb is buggy, dev hsr_slave_1 [ 610.814456] protocol 88fb is buggy, dev hsr_slave_0 [ 610.819556] protocol 88fb is buggy, dev hsr_slave_1 03:37:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x1000000, 0x4}, 0x18) 03:37:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,uqerkid=', @ANYRESDEC=0x0, @ANYBLOB="2c078313583567946f75", @ANYRESDEC=0x0, @ANYBLOB="2c41f5d6ae05415c2593ac"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x20000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {r2, 0x6, "0d88f0", "11801eaa25b78a96917c7655166163063dce49197e5143cf521f07bd42487105fc389152fd28d139caf38b5d62e73028a7197a0662554749bbde9fe8c3b809353e017a4524f5a5e9bdd458f8864112e08a0d6e98bcdd64fcd528e80e0dd48e6c6532995ceaf251099ac6058ad2eb70d64ffaf12ad7c878167ef54ad53b3a87e1fe10067d5fa142e13d8afc1b0f4fba70ee68721e1ade8cf67a47ef82b127c7000fc755f79a1860fb3aeb2512bcc9e647c7cb384aba9f4be69835dde3a5cc88187b65bc4cc24cac5dff365d18661aab8a7ba2476de98f81cebcb9f8584a6d93e15a5a97e48183a68fca5f02ce9b9d1ef607f599fa61ef000b15784a1b3babceef"}}, 0x110) read$FUSE(r0, &(0x7f0000002000), 0x1000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcs\x00', 0x20400, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000480)={0x7ff, 0x1, 0x9, 0xffff, 0x0, 0x9, 0x400}) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)='9p\x00', 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:30 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xfffffdfd, 0x0, 0x0, 0x0) 03:37:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8000, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x6, &(0x7f0000000080)=[{0x6, 0xfffffffffffffffc, 0x0, 0x7f}, {0xc7, 0xd2b, 0x1, 0xffffffff00000001}, {0x7, 0x6, 0x401, 0x1}, {0x5, 0x1, 0x976, 0x1}, {0x1, 0x4, 0xfe000000000000, 0x7ff}, {0xb4, 0x0, 0x1800, 0x40}]}, 0x10) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 611.225338] validate_nla: 7 callbacks suppressed [ 611.225348] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030304730303030303030303030303034303030302c757365725f69643d236a2f8e57f050c79c31520bf31f96594ba62c5c2123062b7704b804776414844cc5c6dea461b91d48acd32cd22f1acdfe5e8b815f3259d7f04c0b7df2e9e38ba3396ec26fb6a2917b25a9847e2fe114aafa916f6d18c21e20e3f69b6ff36d7a1192c2d2f7fd1500bd38901714f87ca25bd3a9a774955eed1e0ca56fc8b35de0e65ffb0e", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d16e58932a8ba061d4cf83192e7c0b9cfad279de2d8837f1541", @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x359001, 0x0) ioctl(r1, 0x8, &(0x7f00000004c0)="2eae959129470e4c8c47e53f547beb0335dc3ca59c28327ca59b409db1ef324645d22018ee07ebe3460d4d3b2603d7b93409042614b80c488d7ea49b9b3d051a4658b4196576ffb0fca6bef33bb69e2c1594141abd78bdc1b45734d1e5e89b166195ca97d53bfe7d406f252aee22bf72fb0709f6bb85bb62ff90b182c2ea99da6b8f4c42ff59fd9991dbd9db4fe5dd864ed46c2aa6547ba3a4905e352db2b1170c726beeaeec3f9d60faed10187445018ad281bd6a697df5b0da862df1289182539b0483ebd6dde55e985beeff69123deb8b5e3b0eaea2cb21a805e90fb28273295ad3aa4860dc56") llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) futimesat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={{}, {0x0, 0x2710}}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000140)={{0xffffffff, 0xfffffffffffffff8}, {0x3, 0x18}, 0x58, 0xbe27ae81ba7b45e7, 0x4}) [ 611.272481] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:30 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) accept4$netrom(r0, 0x0, &(0x7f0000000040), 0x80000) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xfffffff6, 0x0, 0x0, 0x0) [ 611.511478] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:31 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 611.685218] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x8000000, 0x4}, 0x18) 03:37:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x2400, 0x0) ioctl$sock_bt_hci(r2, 0x800448d5, &(0x7f0000000480)="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") 03:37:31 executing program 4: r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x80800) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000140)=""/111, 0x102000, 0x1800, 0x9}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x20000, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f00000001c0)=0x4, 0x4) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x4000000000, 0x0, 0x0, 0x0) 03:37:31 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 612.258736] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="feffffff746d6f64653d30301930303030000000003034303030302c757365725f69643d000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x240200, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000140)={0x2, [0x20, 0x800, 0x3a4, 0x4, 0x7fff, 0x100000000, 0x1, 0x1, 0x4, 0x8001, 0xffff, 0x2c9c, 0x7c, 0x100000000, 0x0, 0x46, 0xffffffff, 0x6c, 0x7f1e, 0xd9a3, 0x5, 0x7, 0x0, 0x9, 0x6, 0xffffffffffffffed, 0x0, 0x10000, 0x5, 0xfcfb, 0xcc, 0xffffffff, 0x81, 0x7fff, 0x52bb, 0xfffffffffffffffe, 0x937, 0x6, 0x9, 0x8, 0x1, 0x2, 0x1, 0x4, 0x4, 0x8, 0x1, 0x7], 0xc}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7, 0x0, 0x0, 0x1}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:31 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x8000000000, 0x0, 0x0, 0x0) 03:37:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xfffffffffffffd71) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 612.541714] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) fgetxattr(r0, &(0x7f0000000040)=@random={'trusted.', 'self\x00'}, &(0x7f0000000140)=""/69, 0x45) 03:37:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xc000000000, 0x0, 0x0, 0x0) 03:37:32 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d756e69782c706f73697861636c2c667363616368652c6d6561737572652c7375626a44757365b9eedb605458194b723d66757365002c686173682c636f6e746578743d73746166665f75"]) 03:37:32 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x800081ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ACQUIRE(0xffffffffffffffff, 0x6430) ioctl$EVIOCGABS20(r0, 0x80184560, 0x0) write$evdev(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x9, 0x8000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000140)={0x0, 0x80000, 0xffffffffffffff9c}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x2200, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000001c0)={r2, 0x80000, r3}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r4, &(0x7f00000040c0), 0x1000) read$FUSE(r4, &(0x7f0000002000), 0x1000) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r4, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r4, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x10000000, 0x4}, 0x18) 03:37:32 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000440)='/dev/vbi#\x00', 0x0, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000001500)={0x10, 0x0, 0x2}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x101) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r2 = getegid() mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB='\x00\x00']) read$FUSE(r1, &(0x7f0000000500), 0x1065) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000340)={0x2, [0xe00000000000, 0x9]}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000003000)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000280)=0x1008) read$FUSE(r1, &(0x7f0000002000), 0x1000) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/snapshot\x00', 0x40800, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000140)={0x2, &(0x7f0000000080)=[{}, {0x0}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r4, 0x40086424, &(0x7f0000000180)={r5, 0x2}) timer_create(0x0, &(0x7f0000001700)={0x0, 0x2a, 0x6, @thr={&(0x7f0000001540)="ee3d4b826d14ca5918b0b1db2ef03bf96f6515a1c988e978d611c8bc965ae8c44127a8cf7c1975f76e11532be0e2eaac3e99ac27d39b3c10cc59688e41cac21ae15f6fe4a23fddc6062ea94167ab96d9cfcdb978839cb938ec4829dbcd88df2e4d9da6ca89d680e95d892e11bda717343db066f15fee3f05c76c74141b6d8ff8812f63ec13d2b0401c1bddc4b3b73e9f590ffcf2018c6d", &(0x7f0000001600)="490cd7c0ff9f9f7aa0d5c38cdfa7bee00bf000e6a497ce9d53435f575ca8cfda7a9b7590d9bbb5b7f677f10c6e7230889164d3ac5b4a777107c2d891b5a13ce38f915f6703119ed3a1fd3a2f08651febad1ff34dc85db2e2f23fede1454e4ecca3644fbaf8829d384e8f4fa2c481dc397b919c888979c908b15dc1219c43d929ecb9841f36c43086b32d82597012dc03cad838285a97b75050c2dd56e26d2d7f4555690a709646503c55989996f0362f8c439abe5e3130ab8594d3fc458366ea8f2e7c4e0b12684d44c409b5efabd4469f3526b1608b71de296006f0426c7ad3a2651b25412a430c93f633ddd318f909835b7ba1438b998e"}}, &(0x7f0000001740)) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) read$FUSE(r3, &(0x7f0000004000), 0x1000) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000001c0)) [ 613.290433] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:32 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x400000000000, 0x0, 0x0, 0x0) [ 613.461268] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:33 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67720600000069643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[0x6]}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)='ip6erspan0\x00', 0xffffffffffffffb9, 0xb68d, 0xa53}) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 613.621466] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x60ffffffffff, 0x0, 0x0, 0x0) 03:37:33 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:33 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 613.768569] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:33 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x740000000000, 0x0, 0x0, 0x0) 03:37:33 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x3f000000, 0x4}, 0x18) 03:37:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c16"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:33 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) flistxattr(r0, &(0x7f0000000480)=""/198, 0xc6) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x7f6c1d533000, 0x0, 0x0, 0x0) 03:37:34 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r1}}, {@smackfsdef={'smackfsdef', 0x3d, 'rootmode'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@hash='hash'}, {@context={'context', 0x3d, 'unconfined_u'}}, {@euid_eq={'euid', 0x3d, r1}}, {@smackfshat={'smackfshat', 0x3d, 'rootmode'}}, {@euid_eq={'euid', 0x3d, r1}}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x7fffffffefff, 0x0, 0x0, 0x0) 03:37:34 executing program 3: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000280)={0x2, 0x0, @multicast1}, &(0x7f0000000340)=0x10, 0x800) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000380)=0xda, 0x4) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000002980)='/dev/rfkill\x00', 0x2100, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000029c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f0000003000), 0x1000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x2100, 0x0) getsockopt$nfc_llcp(r4, 0x118, 0x0, 0x0, 0xfffffffffffffdd7) write$FUSE_IOCTL(r2, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$binfmt_aout(r3, &(0x7f0000000480)={{0x1cf, 0x5e, 0x6, 0x81, 0x35f, 0x10b, 0x220, 0xe9}, "f638f834c3243408ce40121d8c11e602ea4bf6c2162dd0b3acd05d4499ea784f71e5f6e1a662341565ef4c51a23577994eee5ef095956cb0c035665236b77e1b627562722b97fb0ca509b5b9c378c3d3fba32a96126fd9f00fcb6ac11300bcfa9ee287c5ab41145dffaf3697deced468fcfe", [[], [], [], [], [], [], [], [], [], []]}, 0xa92) write$FUSE_GETXATTR(r2, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x3) 03:37:34 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5007fff", 0x2e}], 0x1}, 0x0) 03:37:34 executing program 5 (fault-call:5 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:34 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 614.752640] FAULT_INJECTION: forcing a failure. [ 614.752640] name failslab, interval 1, probability 0, space 0, times 0 [ 614.781578] CPU: 0 PID: 24810 Comm: syz-executor5 Not tainted 5.0.0-rc4+ #52 [ 614.788823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.798207] Call Trace: [ 614.800819] dump_stack+0x1db/0x2d0 [ 614.804473] ? dump_stack_print_info.cold+0x20/0x20 [ 614.809514] ? proc_fail_nth_write+0xa0/0x220 [ 614.814047] should_fail.cold+0xa/0x15 [ 614.817960] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 614.823094] ? ___might_sleep+0x1e7/0x310 [ 614.827291] ? arch_local_save_flags+0x50/0x50 [ 614.831897] __should_failslab+0x121/0x190 [ 614.836167] should_failslab+0x9/0x14 [ 614.839995] __kmalloc_track_caller+0x2d8/0x740 [ 614.844683] ? strncpy_from_user+0x4e0/0x4e0 [ 614.849100] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 614.854653] ? strndup_user+0x77/0xd0 [ 614.854675] memdup_user+0x26/0xb0 [ 614.854695] strndup_user+0x77/0xd0 [ 614.854716] ksys_mount+0x7b/0x150 [ 614.854734] __x64_sys_mount+0xbe/0x150 [ 614.854755] do_syscall_64+0x1a3/0x800 [ 614.854774] ? syscall_return_slowpath+0x5f0/0x5f0 [ 614.854792] ? prepare_exit_to_usermode+0x232/0x3b0 [ 614.854813] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 614.854837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.862699] RIP: 0033:0x458089 [ 614.862714] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 614.862722] RSP: 002b:00007fe99f6a1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 614.862737] RAX: ffffffffffffffda RBX: 00007fe99f6a1c90 RCX: 0000000000458089 [ 614.862745] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000040 [ 614.862754] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 614.862764] R10: 0000000002001000 R11: 0000000000000246 R12: 00007fe99f6a26d4 [ 614.862774] R13: 00000000004c3e38 R14: 00000000004d6f10 R15: 0000000000000004 [ 614.951340] net_ratelimit: 14 callbacks suppressed [ 614.951348] protocol 88fb is buggy, dev hsr_slave_0 [ 614.965301] protocol 88fb is buggy, dev hsr_slave_1 [ 614.975346] protocol 88fb is buggy, dev hsr_slave_0 [ 614.985382] protocol 88fb is buggy, dev hsr_slave_1 [ 614.990552] protocol 88fb is buggy, dev hsr_slave_0 [ 614.995670] protocol 88fb is buggy, dev hsr_slave_1 03:37:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x20) bind$netrom(r1, &(0x7f0000000140)={{0x3, @default, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x48) read$FUSE(r0, &(0x7f0000002000), 0x1000) inotify_init1(0x80800) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:34 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c50000f0", 0x2e}], 0x1}, 0x0) 03:37:34 executing program 5 (fault-call:5 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x40000000, 0x4}, 0x18) 03:37:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x940000000000, 0x0, 0x0, 0x0) [ 615.208596] FAULT_INJECTION: forcing a failure. [ 615.208596] name failslab, interval 1, probability 0, space 0, times 0 03:37:34 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000002", 0x2e}], 0x1}, 0x0) [ 615.252655] CPU: 0 PID: 24823 Comm: syz-executor5 Not tainted 5.0.0-rc4+ #52 [ 615.259895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.259912] Call Trace: [ 615.259938] dump_stack+0x1db/0x2d0 [ 615.259960] ? dump_stack_print_info.cold+0x20/0x20 [ 615.280565] ? __lock_acquire+0x572/0x4a30 [ 615.284816] ? kernel_text_address+0x73/0xf0 [ 615.289252] should_fail.cold+0xa/0x15 [ 615.289273] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 615.289296] ? ___might_sleep+0x1e7/0x310 [ 615.302454] ? arch_local_save_flags+0x50/0x50 [ 615.307062] ? __kmalloc_track_caller+0x158/0x740 [ 615.311931] ? memdup_user+0x26/0xb0 [ 615.315662] ? strndup_user+0x77/0xd0 [ 615.319477] ? do_syscall_64+0x1a3/0x800 [ 615.319497] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.319518] __should_failslab+0x121/0x190 [ 615.319537] should_failslab+0x9/0x14 [ 615.337021] kmem_cache_alloc+0x2be/0x710 [ 615.341200] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 615.346675] ? retint_kernel+0x1b/0x2d 03:37:34 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000003", 0x2e}], 0x1}, 0x0) [ 615.350578] getname_flags+0xd6/0x5b0 [ 615.354396] user_path_at_empty+0x2f/0x50 [ 615.358633] do_mount+0x162/0x3330 [ 615.362195] ? lock_release+0xc40/0xc40 [ 615.366197] ? __check_object_size+0xa3/0x790 [ 615.370716] ? copy_mount_string+0x40/0x40 [ 615.374988] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 615.380574] ? _copy_from_user+0xdd/0x150 [ 615.384743] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 615.390301] ? copy_mount_options+0x30e/0x440 [ 615.394814] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 03:37:34 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000004", 0x2e}], 0x1}, 0x0) [ 615.400385] ksys_mount+0xdb/0x150 [ 615.403962] __x64_sys_mount+0xbe/0x150 [ 615.407969] do_syscall_64+0x1a3/0x800 [ 615.411875] ? syscall_return_slowpath+0x5f0/0x5f0 [ 615.416828] ? prepare_exit_to_usermode+0x232/0x3b0 [ 615.421870] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 615.426759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.431971] RIP: 0033:0x458089 [ 615.435183] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.454100] RSP: 002b:00007fe99f6a1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 615.461829] RAX: ffffffffffffffda RBX: 00007fe99f6a1c90 RCX: 0000000000458089 [ 615.469115] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000040 [ 615.476425] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 615.483706] R10: 0000000002001000 R11: 0000000000000246 R12: 00007fe99f6a26d4 [ 615.483716] R13: 00000000004c3e38 R14: 00000000004d6f10 R15: 0000000000000004 03:37:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:35 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000005", 0x2e}], 0x1}, 0x0) 03:37:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x1000000000000, 0x0, 0x0, 0x0) 03:37:35 executing program 5 (fault-call:5 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x100) r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@ax25={{0x3, @bcast}, [@bcast, @rose, @netrom, @rose, @null, @rose, @null]}, &(0x7f0000000140)=0x80) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)={0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000480)=0xc) getresgid(&(0x7f00000004c0)=0x0, &(0x7f0000000500), &(0x7f0000000540)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)=0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000740)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000280)="9b47515d1a7f2df5ca45a08d2162b00f2f7e7c4dca308712e0c20473ae6cab1385292029", 0x24}], 0x1, &(0x7f0000000700)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @cred={0x20, 0x1, 0x2, r4, r5, r6}], 0x40, 0x800}, 0x40) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r7, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d50b0418ed39e9758e26dda148bfcec748a46f12d753b5deba62cf303dc8b699e3923267a6b834ad94e1f5521d8a2818b42fe37ba19547c7800", @ANYRESDEC=0x0, @ANYBLOB=',gro5p_id=', @ANYRESDEC=0x0, @ANYBLOB="290b8f00"]) read$FUSE(r7, &(0x7f00000040c0), 0x1000) read$FUSE(r7, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r7, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r7, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 615.670305] FAULT_INJECTION: forcing a failure. [ 615.670305] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 615.682166] CPU: 0 PID: 24855 Comm: syz-executor5 Not tainted 5.0.0-rc4+ #52 [ 615.689382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.698842] Call Trace: [ 615.698875] dump_stack+0x1db/0x2d0 [ 615.698898] ? dump_stack_print_info.cold+0x20/0x20 [ 615.698939] should_fail.cold+0xa/0x15 [ 615.698964] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 615.698987] ? lock_downgrade+0x910/0x910 [ 615.710257] ? kasan_check_read+0x11/0x20 [ 615.710279] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 615.710296] ? print_usage_bug+0xd0/0xd0 [ 615.710316] ? rcu_softirq_qs+0x20/0x20 [ 615.719307] should_fail_alloc_page+0x50/0x60 [ 615.719325] __alloc_pages_nodemask+0x323/0xdc0 [ 615.719339] ? __lock_acquire+0x572/0x4a30 [ 615.719353] ? kernel_text_address+0x73/0xf0 [ 615.719374] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 615.727671] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 615.727705] ? ___might_sleep+0x1e7/0x310 [ 615.727729] ? trace_hardirqs_off+0xb8/0x310 [ 615.737078] cache_grow_begin+0x9c/0x8c0 [ 615.737096] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 615.737116] ? check_preemption_disabled+0x48/0x290 [ 615.737137] kmem_cache_alloc+0x645/0x710 [ 615.737154] ? fs_reclaim_acquire+0x20/0x20 [ 615.745628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 615.745646] ? should_fail+0x1e6/0xd22 [ 615.745668] getname_flags+0xd6/0x5b0 [ 615.745688] user_path_at_empty+0x2f/0x50 [ 615.778146] do_mount+0x162/0x3330 [ 615.778164] ? lock_release+0xc40/0xc40 [ 615.778187] ? __check_object_size+0xa3/0x790 [ 615.778207] ? copy_mount_string+0x40/0x40 [ 615.818657] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 615.822354] protocol 88fb is buggy, dev hsr_slave_0 [ 615.826171] ? _copy_from_user+0xdd/0x150 [ 615.830718] protocol 88fb is buggy, dev hsr_slave_1 [ 615.834881] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 615.834900] ? copy_mount_options+0x30e/0x440 [ 615.834924] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 615.834943] ksys_mount+0xdb/0x150 [ 615.834963] __x64_sys_mount+0xbe/0x150 [ 615.834983] do_syscall_64+0x1a3/0x800 [ 615.849680] ? syscall_return_slowpath+0x5f0/0x5f0 [ 615.849700] ? prepare_exit_to_usermode+0x232/0x3b0 [ 615.849723] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 615.849749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.860303] RIP: 0033:0x458089 03:37:35 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000006", 0x2e}], 0x1}, 0x0) 03:37:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x20000000000000, 0x0, 0x0, 0x0) [ 615.860318] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.860327] RSP: 002b:00007fe99f6a1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 615.860342] RAX: ffffffffffffffda RBX: 00007fe99f6a1c90 RCX: 0000000000458089 [ 615.860352] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000040 [ 615.860361] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 615.860370] R10: 0000000002001000 R11: 0000000000000246 R12: 00007fe99f6a26d4 [ 615.860382] R13: 00000000004c3e38 R14: 00000000004d6f10 R15: 0000000000000004 03:37:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x100000000000000, 0x4}, 0x18) 03:37:35 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8e5, 0x181080) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:35 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000007", 0x2e}], 0x1}, 0x0) 03:37:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x30531d6c7f0000, 0x0, 0x0, 0x0) 03:37:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="66643dc3a53ba8bdf35a219b5f4be52e9bc97a2887a3e51b293f97d06a3cad2604203270c7c1480c57b6d591fc5283b60ec94ea3fc22b97228d9a6a7183f052029705ef559ddcc85e846", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x48000, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f06003d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:36 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000008", 0x2e}], 0x1}, 0x0) 03:37:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000042000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f00000004c0)={0x9, 0x200, 0x100000001, @remote, 'ip6erspan0\x00'}) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x480000, 0x41) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x43, 0x0, 0xc6, 0x3c1}, &(0x7f0000000140)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={r3, @in6={{0xa, 0x4e21, 0xffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x81, 0x3, 0xfffffffffffff801, 0x2, 0x4}, 0x98) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x30710000000000, 0x0, 0x0, 0x0) 03:37:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x800000000000000, 0x4}, 0x18) 03:37:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) [ 616.540522] protocol 88fb is buggy, dev hsr_slave_0 [ 616.545711] protocol 88fb is buggy, dev hsr_slave_1 [ 616.613711] validate_nla: 17 callbacks suppressed [ 616.613720] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:36 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500000a", 0x2e}], 0x1}, 0x0) [ 616.654902] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\td=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) fstat(r1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000880)=0xe8) r9 = getegid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f00000009c0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f0000000b80)=0xe8) getgroups(0x2, &(0x7f0000000bc0)=[0xee00, 0x0]) r14 = getuid() lstat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000cc0)={0x468, 0x0, 0x1, [{{0x4, 0x3, 0x9300000000000000, 0x0, 0x1, 0x5, {0x3, 0xff, 0x3, 0x7f, 0xa0b7, 0x5, 0x9e, 0x7fffffff, 0x80, 0x9, 0xe000000000000000, r2, r3, 0x8001, 0xfffffffffffffffb}}, {0x4, 0x8000, 0x8, 0x2, 'rootmode'}}, {{0x3, 0x1, 0x100000001, 0x3, 0x808d, 0x1ff, {0x6, 0x7f, 0x2, 0x1, 0x401, 0x10001, 0x8, 0x1ff, 0x8, 0x9, 0x8000, r4, r5, 0x8, 0x783c}}, {0x5, 0x8, 0x0, 0x4210fb54}}, {{0x0, 0x1, 0xffff, 0x81, 0x2, 0x3, {0x3, 0x7, 0x1, 0x3, 0x1, 0x200, 0xee53, 0x7, 0x0, 0x2, 0xffffffff, r6, r7, 0x0, 0x3}}, {0x4, 0xa9c, 0x0, 0xffffffff}}, {{0x0, 0x3, 0x8, 0x8001, 0x5, 0x100, {0x5, 0x6, 0x6, 0x5, 0x5e9, 0x26e, 0x10000000000, 0x8, 0x7f, 0x9, 0x1, r8, r9, 0x3, 0x81}}, {0x6, 0x7, 0x4, 0x800, 'eth1'}}, {{0x0, 0x0, 0xa7, 0x8, 0x2, 0x43b, {0x6, 0x9, 0x3, 0x7, 0x8, 0x5, 0x0, 0x1ff, 0x9, 0x4, 0xa, r10, r11, 0x101, 0x101}}, {0x1, 0x9, 0x7, 0x1ff, 'user_id'}}, {{0x4, 0x0, 0x3, 0x4, 0xe96e, 0x85, {0x4, 0xab25, 0x8001, 0x80, 0x9, 0x6, 0x1, 0x2, 0x0, 0x8, 0x5, r12, r13, 0x9, 0x40}}, {0x6, 0x6, 0xa, 0x40, '/dev/fuse\x00'}}, {{0x2, 0x1, 0xfffffffffffffffa, 0x8, 0xa5, 0x200, {0x2, 0x9, 0x0, 0x452, 0x9b3b, 0x100000000, 0x8, 0x8, 0x7, 0x6, 0x2, r14, r15, 0x5, 0x100000000}}, {0x2, 0x5, 0x7, 0x4, 'user_id'}}]}, 0x468) socketpair(0xa, 0x6, 0x3, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$netrom_NETROM_T2(r16, 0x103, 0x2, &(0x7f00000001c0)=0xc29c, &(0x7f00000011c0)=0x4) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x6b6b6b00000000, 0x0, 0x0, 0x0) 03:37:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x1000000000000000, 0x4}, 0x18) 03:37:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000040)) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB="2c67729b563da63aecd6", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 616.832715] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:36 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500000e", 0x2e}], 0x1}, 0x0) 03:37:36 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) recvfrom(r0, &(0x7f0000000280)=""/9, 0x9, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000140)=0x0) r5 = geteuid() ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000180)={0xffffffff00000001, 0x5, r4, 0x0, r5, 0x0, 0x9, 0x2}) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x8000a0ffffffff, 0x0, 0x0, 0x0) 03:37:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030703a18620783cc70e87130303030303030303030303034303030302c757365070000003d2ab76621b4d0c9ccbda679c81b3f894848cfea96502a9544105dcaa67fecf52ff807e7d2a6d76083b199520a12372c3620bf1da6cafcea1e8f31dfc0ebe3b339cc19b1c9a8e5b933b15bbddb8d96db9bab222302db03df871e91a9ef08f6d788d8ac02a9157023c8d36b5d542266082023bfd895db6ddc31bebe6c3cdb693a0bcf54f8280040ec778cc69846", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000480)=""/210, &(0x7f0000000080)=0xd2) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 617.080994] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:36 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500000f", 0x2e}], 0x1}, 0x0) 03:37:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x3f00000000000000, 0x4}, 0x18) [ 617.275037] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x80ffff00000000, 0x0, 0x0, 0x0) 03:37:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="01043df79c10a7b56c99974e771fda082fb5be0bc86cb5c836a772c044e5a6929db77f1974df76067c64ddf0866514e2ebb301d31f02a518313f4453603aab198bb54da1b60f784aae464ea4f54ed6a973440ab06fa7cbce98820a17f6ee0600274063e081b5493a992b1bc159fa807e079bf09e733483962290fd8ba38e11d26653", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x204000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xfbe0523e91ea75a5}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r2, 0x200, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000080}, 0x40080) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2000008, 0x0) 03:37:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0005fc9cf93276c789a61b0139af398b74e5e772e63971efabf8dc387a07cf30cda674557679ffb1a500c9e816c2898fc9bccf5aa107341aba935e9cedcdb404b3998bbfb70000000060a764e2b9387645211fd247cf29f2eee52ba602e9dd97cc7385769109d4548ebeac6869d1fe43df04aad1f56c7835abc69b634caab05f89580e279d0a3e4b20948d796dafd26b155e2e0bb3c8c9c189fe1aca5ec9d1138e147e291aca5f2193cfc1b2f96c05d991b34f9946d20a"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r2, &(0x7f0000000140)='./file0\x00', r3, r4, 0x400) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) prctl$PR_GET_SECUREBITS(0x1b) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:37 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000010", 0x2e}], 0x1}, 0x0) 03:37:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x4000000000000000, 0x4}, 0x18) [ 617.523631] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x200000e, 0x0) 03:37:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84800) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000140)={0x1ff, 0x0, [], {0x0, @reserved}}) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:37 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000048", 0x2e}], 0x1}, 0x0) 03:37:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xa0500000000000, 0x0, 0x0, 0x0) 03:37:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001002, 0x0) [ 617.804354] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:37 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500004c", 0x2e}], 0x1}, 0x0) 03:37:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0xffffffff00000000, 0x4}, 0x18) 03:37:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) semget(0x2, 0x3, 0x20) 03:37:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xa0700000000000, 0x0, 0x0, 0x0) [ 618.028286] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 618.065058] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:37 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000060", 0x2e}], 0x1}, 0x0) [ 618.180104] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x8}}, 0x18) 03:37:37 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000068", 0x2e}], 0x1}, 0x0) 03:37:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 03:37:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000080)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:37 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080)={0x2}, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = semget$private(0x0, 0x4, 0x585) semctl$IPC_RMID(r2, 0x0, 0x0) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f0000000180)={0x10, 0x2, &(0x7f0000000140)="9dd1dc20dbc3fc8f42715f775a1cc9806be6d401e8ea88223b370dadf7ef", {0x9, 0xffffffff, 0x41415270, 0x8, 0x7ff, 0x0, 0x0, 0x2}}) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:38 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500006c", 0x2e}], 0x1}, 0x0) 03:37:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001003, 0x0) 03:37:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x100004000000000, 0x0, 0x0, 0x0) 03:37:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x10}}, 0x18) 03:37:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f0000000180)={0xfd2d, 0x0, 0x4}, 0x18) 03:37:38 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000074", 0x2e}], 0x1}, 0x0) 03:37:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000040)) 03:37:38 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500007a", 0x2e}], 0x1}, 0x0) 03:37:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x100008000000000, 0x0, 0x0, 0x0) 03:37:38 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c50000f0", 0x2e}], 0x1}, 0x0) 03:37:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x3f00}}, 0x18) 03:37:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000400)='./file1\x00', 0x4) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000680)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="88643d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="0000226f440b97f8380040bc67424c415dca53de583e7424743318fdc796cfa443fde5f7c1c335cbdad428b04d2e6acfeaa1ecd7964c7f719f9d613592d803ed849c6b2b7491b3931b526d2a05a1ffbac7d1a39ae3ae534d862ed7fdc05fd6e445d17304434c039244f4bda3b257984b41c7b0342c4129acdc2460ad320de2423988ea47636b06f524b85be9a4e690ba471d1e504deb96213d0b53"]) statfs(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/9) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x12d) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) r2 = syz_open_dev$usb(&(0x7f0000000480)='/dev/bus/usb/00#/00#\x00', 0x8e4, 0x90000) openat$cgroup_subtree(r2, &(0x7f00000004c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xff, 0x901) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r3, &(0x7f0000000340)}, 0x10) io_setup(0x8001, &(0x7f00000003c0)=0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r5 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x5, 0x202081) io_cancel(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x0, r1, &(0x7f0000000140)="8543492250cd8272e1f712291b627720a947d8e8827df9dccfeb8828233d35a79f0f702d32a8bdf47c5662eb377aebf6579d70b282bcf7e3a294168372212321e0fc2ace1bf0ce93a243526508b75fbc513bec8b29c7af8465d00ac669482e49471880a3e4d34cdc949426c2c832c3275e87d3bcec6bb1fcdc09aeef7af7d2", 0x7f, 0x80000000, 0x0, 0x1, r5}, &(0x7f0000000280)) 03:37:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x10000c000000000, 0x0, 0x0, 0x0) 03:37:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x200100b, 0x0) 03:37:39 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500000b", 0x2e}], 0x1}, 0x0) 03:37:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x4000}}, 0x18) 03:37:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x101000000000000, 0x0, 0x0, 0x0) 03:37:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000140)={0x49, 0x29, 0x2, {0x2, [{{0x40, 0x1}, 0x5, 0xa16f, 0x7, './file0'}, {{0x2c, 0x4, 0x4}, 0x6, 0x3, 0x7, './file0'}]}}, 0x49) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) uselib(&(0x7f0000000080)='./file0\x00') llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:39 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 03:37:39 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x1000000}}, 0x18) 03:37:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gvoup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 619.978826] net_ratelimit: 16 callbacks suppressed [ 619.978834] protocol 88fb is buggy, dev hsr_slave_0 [ 619.989049] protocol 88fb is buggy, dev hsr_slave_1 03:37:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() write$FUSE_ATTR(r0, &(0x7f0000000340)={0x78, 0x0, 0x1, {0x0, 0xffffffff, 0x0, {0x5, 0x9, 0x8, 0x0, 0x7, 0x8, 0x2, 0x0, 0xfffffffffffffff7, 0x8, 0x8000, r1, r2, 0x1000, 0x7}}}, 0x78) read$FUSE(r0, &(0x7f0000002000), 0x1000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r4 = dup(r0) getsockopt$nfc_llcp(r4, 0x118, 0x0, 0x0, 0x4b0f9dfa) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7, 0x2, 0x0, 0xfffffffffffffffe}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:40 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x400000000000000, 0x0, 0x0, 0x0) 03:37:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") shmget(0x2, 0x4000, 0x2, &(0x7f0000ff9000/0x4000)=nil) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001020, 0x0) 03:37:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x8000000}}, 0x18) [ 620.698451] protocol 88fb is buggy, dev hsr_slave_0 [ 620.703692] protocol 88fb is buggy, dev hsr_slave_1 03:37:40 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x500000000000000, 0x0, 0x0, 0x0) 03:37:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6fbe653d6f30303030f4264733c9e47ffaac25985db325b0473030303030303030303030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = socket(0x1, 0xa, 0x9) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000000c0)=0x5, 0x4) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:40 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00864c49753d076b8b", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="79b4e2b10a24fe"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@v1={0x2, "212a5d50ec7de73dbb43472f6ed5b604c239"}, 0x13, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x420000, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000280)=0x2, 0x1) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x203, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000080)={0x0, 0xb999, 0x30}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000340)={r3, @in={{0x2, 0x4e22, @multicast2}}}, 0x84) write$P9_RFLUSH(r2, &(0x7f0000000180)={0x7, 0x6d, 0x1}, 0x7) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x10000000}}, 0x18) 03:37:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x600000000000000, 0x0, 0x0, 0x0) 03:37:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c10"]) read$FUSE(r0, &(0x7f00000040c0), 0xfffffffffffffeb2) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x11) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:40 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000001", 0x2e}], 0x1}, 0x0) [ 621.178248] protocol 88fb is buggy, dev hsr_slave_0 [ 621.183369] protocol 88fb is buggy, dev hsr_slave_1 [ 621.188548] protocol 88fb is buggy, dev hsr_slave_0 [ 621.193630] protocol 88fb is buggy, dev hsr_slave_1 [ 621.198839] protocol 88fb is buggy, dev hsr_slave_0 [ 621.203931] protocol 88fb is buggy, dev hsr_slave_1 03:37:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) shmget$private(0x0, 0x3000, 0x40, &(0x7f0000ffd000/0x3000)=nil) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) [ 621.351490] QAT: Invalid ioctl [ 621.382040] QAT: Invalid ioctl 03:37:40 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="b8036353"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0xffffffffffffffb1) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x3f000000}}, 0x18) 03:37:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x700000000000000, 0x0, 0x0, 0x0) 03:37:41 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 621.737283] validate_nla: 19 callbacks suppressed [ 621.737293] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="8000000000000000643d70d6a7b9f3827fc55901cab3409d83f520044f2cc3da159c8000bbc7c35dbf8eff000000433409bdbcecec18aebc9e62b08412253f97c0126c8638fd610ef1aac489e66fe7a249c5d2fc", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:41 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x700008000000000, 0x0, 0x0, 0x0) 03:37:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x40000000}}, 0x18) 03:37:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f00000001c0)={0x0, {0xd49, 0x8}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x22000, 0x0) ioctl$VIDIOC_S_INPUT(r2, 0xc0045627, &(0x7f0000000180)=0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") socket$packet(0x11, 0x3, 0x300) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) bind$pptp(r1, &(0x7f0000000080)={0x18, 0x2, {0x8, @remote}}, 0x1e) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 622.031886] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x37, 0x1, 0x7, "01e1c518ed3039d38af54d993fad659a", "52ff8cd2aceb340188f80da660c7c6fca0cfe1b2128fdf4c279bc77965b51cb07d41"}, 0x37, 0x1) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x1, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000240)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:41 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRES32=r0, @ANYRESDEC=0x0, @ANYBLOB="16517cd40690015b"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) accept4$unix(r1, &(0x7f0000000180), &(0x7f0000000280)=0x6e, 0x800) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "3e7fa25c0d8721d65849d23e250ecf6a8362b64445690160cecab11fa4cbd4f9e0df699ee7a9ff5a73e72adda9eebbbf89fb8bcc45"}, 0x39) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x800008000000000, 0x0, 0x0, 0x0) 03:37:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x100000000000000}}, 0x18) 03:37:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="6eacc7", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0xfff) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 622.335452] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:42 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) ioctl$TIOCNXCL(r1, 0x540d) 03:37:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) syz_emit_ethernet(0x3b, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @remote, [{[{0x9100, 0x400, 0x6, 0x4}], {0x8100, 0xdfee, 0x0, 0x3}}], {@llc={0x4, {@snap={0x1, 0x0, "a6c5", "459aa9", 0xfbff, "b5c653c1dc9d6f1e33e3550e8db920ed39ee38e4fef432d783149e04"}}}}}, &(0x7f0000000080)={0x1, 0x2, [0x2bf, 0xc94, 0xede, 0x6ea]}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socket$kcm(0x29, 0x5, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e21, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}, 0x10000, 0x2}, &(0x7f0000000280)=0x90) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x900000000000000, 0x0, 0x0, 0x0) 03:37:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x800000000000000}}, 0x18) [ 622.599340] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:42 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 622.786298] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d5ddec029f654c4f393ff255c90ac1aeed1949f4267dbab92ec79ca55249be41a45dc95e4589aafb9fac38bc9be17b34b4ff66f54f2a48ab31c2d0174aeb8874eabad3fc7582901e9ad39de215561d34df35185c1ed4589e4cbb02b561406b587199fa6005e0fdb6882a10553c08eabf301e5a76f9bd5aa5fb2117750b664", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1100000, 0x0) 03:37:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6fbe82e893311fab00d8dd6d6f64653d3030303030303030303030303030303030303430303030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="574b9a56c969856cc332840b037efcd02b8364670376b4a44cd082923f930987b12d13caecaf867505"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x4000, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000440)={0x2, 0x34363248, 0x1, 0xd49e, 0x3, @discrete={0x1}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) signalfd4(r0, &(0x7f0000000140)={0x81}, 0x8, 0x80000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x0, 0x156) bind$llc(r3, &(0x7f0000000640)={0x1a, 0x0, 0x415, 0x3fb5, 0x8, 0x5, @random="001372a5ea47"}, 0x10) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x1, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r4, 0x10f, 0x84, &(0x7f0000000540), &(0x7f0000000580)=0x4) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) r5 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x8, 0x101000) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x8001, 0x30}, &(0x7f0000000380)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000480)={r6, @in6={{0xa, 0x4e21, 0x3, @loopback, 0x8}}}, &(0x7f00000003c0)=0x84) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r5, 0x110, 0x4, &(0x7f00000001c0)=0x2, 0x4) r7 = fcntl$getown(r4, 0x9) fgetxattr(r5, &(0x7f00000005c0)=@known='trusted.syz\x00', &(0x7f0000000780)=""/162, 0xa2) perf_event_open(&(0x7f00000006c0)={0x4, 0x70, 0x2, 0x3ff, 0x26, 0x4, 0x0, 0x3, 0x30, 0x4, 0x20, 0x221, 0x5, 0x1, 0x6, 0x1, 0x9, 0x8, 0x80000001, 0x1000, 0x2, 0x9, 0x1, 0x620, 0xf8b, 0x7, 0xd3, 0xfffffffffffffffc, 0x81, 0x0, 0x3, 0x1ccd9f47, 0x8, 0x401, 0x401, 0x3, 0x589c, 0x5, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000680), 0xf}, 0x21100, 0x8, 0x8b1, 0x7, 0x8, 0xffffffffffffffff, 0x8}, r7, 0x5, r5, 0x1) write$cgroup_subtree(r3, &(0x7f0000000900)=ANY=[@ANYBLOB="2b6d656d6f7279a73bb741f8202b696f20e365521482da12648ade86fca5650204bd1aafd0af7f12071d1a6c276b1bd44981fd262419db"], 0x11) 03:37:42 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x6100, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xa00000000000000, 0x0, 0x0, 0x0) 03:37:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x1000000000000000}}, 0x18) [ 623.306468] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000140)="3d940b9eda0ab66e792c6b39680ef646841ed2123efcda86d3aca3b1ed3ca60eb0260f57584ad5ee277e9ef89dd4c8812dfd7e681c2d180efbf708460e7c36bb6915740c1c9bf102a17577578a3248c544d1796555fc7c9b03106cd7f46b7610c1f46b9343678edf03d883a22bf21db0088e2658cb302e29440892f2b158989aedfb") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x1) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:42 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xb00000000000000, 0x0, 0x0, 0x0) 03:37:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="f404"]) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000140)=0x8) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x3f00000000000000}}, 0x18) [ 623.558739] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:43 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xd00000000000000, 0x0, 0x0, 0x0) [ 623.808776] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x4000000000000000}}, 0x18) 03:37:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x402, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000140)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:43 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x1, 0x0) r3 = dup2(r1, r1) renameat(r2, &(0x7f0000000140)='./file0\x00', r3, &(0x7f0000000180)='./file0/../file0\x00') ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f00000001c0)) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 624.177382] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:43 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) connect$rose(r0, &(0x7f0000000140)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, 0x4, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x1400000000000000, 0x0, 0x0, 0x0) 03:37:43 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0xffffffff00000000}}, 0x18) 03:37:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="000001", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 624.515266] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x8001, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000340)={0x68, 0x29, 0x2, {0x784, [{{0x2, 0x1000, 0x4}, 0xd, 0x5, 0x7, './file0'}, {{0x80, 0x3, 0x7}, 0x7, 0x7, 0x7, './file0'}, {{0x86, 0x3, 0x7}, 0x298c7398, 0x1, 0x7, './file0'}]}}, 0x68) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x20600, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x9, 0x0, 0xfffffffffffffc00}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f00000001c0)={r4, 0x200}, 0x8) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x7e79e0b83be6d080) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:44 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x1900008000000000, 0x0, 0x0, 0x0) 03:37:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x0, 0x8}}, 0x18) 03:37:44 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000080)=""/56) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x694beacc) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) read$FUSE(r0, &(0x7f0000000480), 0x1000) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000140)) 03:37:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:44 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x1a00008000000000, 0x0, 0x0, 0x0) 03:37:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1, 0x200000) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000140), 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000180)=0x7) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r1, &(0x7f00000001c0)={0xffffffffffffffa6, 0x0, 0x804}, 0x10) 03:37:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x0, 0x10}}, 0x18) [ 625.336262] net_ratelimit: 14 callbacks suppressed [ 625.336271] protocol 88fb is buggy, dev hsr_slave_0 [ 625.346448] protocol 88fb is buggy, dev hsr_slave_1 [ 625.351624] protocol 88fb is buggy, dev hsr_slave_0 [ 625.356778] protocol 88fb is buggy, dev hsr_slave_1 [ 625.361990] protocol 88fb is buggy, dev hsr_slave_0 [ 625.367142] protocol 88fb is buggy, dev hsr_slave_1 03:37:45 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c50000ff", 0x2e}], 0x1}, 0x0) 03:37:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x1d00008000000000, 0x0, 0x0, 0x0) 03:37:45 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x0, 0x3f00}}, 0x18) 03:37:45 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) 03:37:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = socket$caif_stream(0x25, 0x1, 0x3) setsockopt(r1, 0x20, 0x4, &(0x7f0000000040)="b5bc60911dc48585300c67d09e67efabebaa696b9a859190466b62081ae3c98f236cdab881f113fd4e8f08f734307cf102913e61d3ec777c1193bbcc9f2e7c3eedf3e507864bbec61b6bedc598e2b170b918078fcbc3d123a6118d5a7bd3e83348b010ef51980d3e889e5e2e0088fa172623fa5d2e1b", 0x76) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000180)={0x5, [0x6, 0x7f, 0x2, 0x7fffffff, 0x1, 0xffffffffffffff01, 0xfffffffffffffff7, 0xfff, 0x401, 0x8, 0x12, 0x1, 0xffffffffffffffff, 0x4, 0x1c, 0x1, 0xfffffffffffeffff, 0x3b20, 0x1ff, 0x7ff, 0x3ff, 0xffffffff00000001, 0xffffffffffffb98b, 0x1000, 0x9, 0xdd, 0x0, 0x8, 0x1f, 0x7f, 0x80ee, 0x0, 0x400, 0x4, 0x10000, 0x80, 0x4, 0x3, 0x4d8, 0x5, 0x9, 0x80000001, 0x4, 0x6, 0x5, 0xffffffffffffffc2, 0x1, 0xe69], 0xd}) write$FUSE_GETXATTR(r0, &(0x7f0000000140)={0x238, 0xffffffffffffffff, 0x6, {0x1000}}, 0x18) [ 626.215708] protocol 88fb is buggy, dev hsr_slave_0 [ 626.220936] protocol 88fb is buggy, dev hsr_slave_1 03:37:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x189000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000140)={0x230, 0x1c, [0x3, 0x5, 0xfff, 0x9af, 0x7, 0x8001, 0xf37]}) 03:37:45 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) 03:37:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x0, 0x4000}}, 0x18) 03:37:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x2000, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',root^\x00\x00\x00=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x2, 0x103401) setsockopt$CAIFSO_LINK_SELECT(r2, 0x116, 0x7f, &(0x7f0000000140)=0x5, 0x4) 03:37:46 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x3, 0x400) getsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000140), &(0x7f0000000180)) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x5000000000000000, 0x0, 0x0, 0x0) 03:37:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x0, 0x1000000}}, 0x18) 03:37:46 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 626.769925] validate_nla: 10 callbacks suppressed [ 626.769935] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='syscall\x00') ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) fcntl$notify(r0, 0x402, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 626.935337] protocol 88fb is buggy, dev hsr_slave_0 [ 626.940575] protocol 88fb is buggy, dev hsr_slave_1 03:37:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) unlink(&(0x7f00000000c0)='./file0/file0\x00') 03:37:46 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0) 03:37:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x0, 0x8000000}}, 0x18) 03:37:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000580), 0xff0c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) r2 = getpid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x6, &(0x7f0000000140)=[0xffffffffffffffff, 0xee01, 0xee01, 0xffffffffffffffff, 0xee00, 0xee00]) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={r2, r3, r4}, 0xc) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75605f69643d495c1b8de87430c3a41ee625dad56d5616ef117bf4b113dfb9a790c32aefd2ade41270758e95fc7b184531527e6616eb151a", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x90582e0cbc63c204) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 627.401362] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:47 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x20000, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302cf9ffffffffffffff2521bac46ce26c8629d4e382da8f7eec24914eb2279054958d", @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 627.569786] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0) 03:37:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x0, 0x10000000}}, 0x18) 03:37:47 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 627.832326] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="65217f", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030b72de80b037d030a95e308c8b63034", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0000f01cf476e31d39de964f5d708c8e5c937b19116ee6eec8e78392da8beea6f6c1526a2a76e48d4cc4be7ec3d6a87dfc23fdce0b9121e852aa4653e299ad994307b483e8784b1cffd9a8d53143322802c8a7fbfeb2806314e5ddaa4e2e1775d752b56b04b1a7e53cf438d9609e399c52c1b0853ab207864e6cad4d372fda9370c436a70c3dde0af57376e1d6080cec0cd8d99b583cdb519024114662263e493fc9d814f5a1647d55b32b81d68052bb6a57cbc8668109e31f6992c373eec4ff722674817d9bb708197b42765a2dd3b27c8a4908cc3cfb4f5aca"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000000c0)={0x18, 0x0, 0x4, {0x8}}, 0x18) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000080)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x2000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000004c0), 0x13f, 0x6}}, 0x20) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000540)=""/170, &(0x7f0000000600)=0xaa) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000080)=[0xffffffffffffffff, 0xffffffffffffffff]) write$FUSE_ENTRY(r1, &(0x7f0000000340)={0x90, 0x0, 0x6, {0x0, 0x1, 0x1f, 0xca, 0x1800, 0x4, {0x0, 0x3, 0x4, 0x3, 0xfffffffffffffffd, 0x9, 0x200, 0x7ff, 0x3f, 0x80000001, 0x3ff, r2, r3, 0x3, 0x81}}}, 0x90) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) openat$fuse(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) r4 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) socket$nl_generic(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000640)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 03:37:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xfcfdffff00000000, 0x0, 0x0, 0x0) 03:37:47 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x0, 0x3f000000}}, 0x18) [ 628.359740] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:48 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66ffff", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(0xffffffffffffffff, &(0x7f00000050c0), 0xeb) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7, 0x0, 0x400}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:48 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x400000) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000480)={0x0, 0x0, 0x4, 0x0, [], [{0x8, 0x3, 0x7, 0x1, 0x71, 0x20}, {0x2, 0x1, 0x4808, 0xfffffffffffffffa, 0x6, 0x5}], [[], [], [], []]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\adk', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xfdfdffff00000000, 0x0, 0x0, 0x0) 03:37:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x0, 0x40000000}}, 0x18) [ 628.570976] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) r1 = fcntl$getown(r0, 0x9) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r1, r2, 0x0, 0x2, &(0x7f0000000080)=')\x00', r3}, 0x30) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:48 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)=0x5) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="b104"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000480)={0x7, 0x0, [{0x8000000b, 0x1, 0x1, 0x631, 0x7, 0xc44, 0xff}, {0xc0000007, 0xe3ac, 0x1, 0x4, 0x7, 0xffff, 0x7}, {0xb, 0xfff, 0x5, 0x5, 0x6, 0x80, 0x3}, {0x80000007, 0x8, 0x4, 0x100, 0xfff, 0xa60, 0x9}, {0xc0000000, 0x100000001, 0x1, 0x8, 0x80000001, 0x400, 0x2}, {0x4, 0xba, 0x4, 0x8, 0x5, 0x1f, 0xfffffffffffffffa}, {0x80000001, 0x6, 0x6, 0xf14, 0x2, 0x1, 0x1}]}) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000140)={0x6, 0x7, 0x6, 0x9, 0x4, 0x2, 0x3, 0xc730, 0x5, 0x5, 0x5, 0x7ff}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xffffffff}}, 0x30) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xffefffffff7f0000, 0x0, 0x0, 0x0) [ 628.898837] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x0, 0x100000000000000}}, 0x18) [ 628.971455] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:48 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00e0a45d76c042b6632bc65d53253d34b4eb79addf6eb92f1c73080df14755a853b3433ad0fad1a0cd3bbadf2e7018bf24fe07bec9"]) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000280)={0x4, [0x1, 0x40, 0x3ff, 0x5]}, &(0x7f0000000340)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000500)={0x10001, 0x6, 0x0, 0x1f000000, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}]}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000580)=""/50) fchdir(r1) pwrite64(r1, &(0x7f00000005c0)="2d05081561d3e79d79bed47881f8997cc8feec44fc5b6a6e8c2a622e73fd5fca3b3607df1afe0639c7b2c056e5b449536e218aed8cd3740040bc84cc24d8fb239c9cba17fcba353528d7e883c22b413dab862d3dea0c98ee0f064e03f39a9a2a3d20d2d74b3c4c69459c109697de3e9d6e25cf7169583eb1e7823d00d6bf4390e51d20afdc8616f3aaeddefa2584d66db1dbdd2f66", 0x95, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 629.224384] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 629.255831] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) 03:37:48 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x57, 0x0, 0x2, {0x7, 0x0, 0xffffffffffffffff}}, 0x3b5) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x0, 0x800000000000000}}, 0x18) 03:37:48 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xffffffffa0008000, 0x0, 0x0, 0x0) 03:37:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c677280f5a0216940d33717f64d60a52eb20bda13fdb5da3ab034f05bb5965e62830f2da1d4f5df90d4cd2db7bea5778855", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:49 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="f5a9cc2c44d6affb91bd55f4ecc92fd4"]) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10000, 0x0) 03:37:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x0, 0x1000000000000000}}, 0x18) 03:37:49 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='id=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x80) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) timerfd_gettime(r2, &(0x7f0000000140)) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xffffffffff600000, 0x0, 0x0, 0x0) 03:37:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x0, 0x3f00000000000000}}, 0x18) 03:37:49 executing program 4: syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0x9, 0x30000) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x40000000000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0xfcd2706840969add, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000140)={0x5, 0x2, 'client0\x00', 0xffffffff80000001, "3027cb9e27f1dffe", "2e10bed7384307f55c4a9013675d8a286262d4f60e2dbd5789f5cab8a0c60792", 0x2, 0x6}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mkdir(&(0x7f0000000080)='./file0\x00', 0x48) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000240)=0xe32, 0x4) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@ipv4={[], [], @loopback}, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@local, @in6=@empty}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/btrfs-control\x00', 0x2, 0x0) statx(r1, &(0x7f0000000440)='./file0/file0\x00', 0x800, 0x114, &(0x7f0000000880)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f0000000780)=0xe8) lstat(&(0x7f00000007c0)='./file0/file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x8000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'selfsecurity@system'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@appraise='appraise'}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000300)={0x8000, 0xd96d, 0x4c4a}, 0x8) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) r5 = open(&(0x7f00000000c0)='./file1\x00', 0x4000, 0x1d6) ioctl$SG_GET_SG_TABLESIZE(r5, 0x227f, &(0x7f0000000140)) 03:37:49 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r2 = socket(0x19, 0x802, 0x9) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000240), &(0x7f0000000280)=0x4) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x2, 0x0, 0x0) [ 630.373612] net_ratelimit: 16 callbacks suppressed [ 630.373621] protocol 88fb is buggy, dev hsr_slave_0 [ 630.383852] protocol 88fb is buggy, dev hsr_slave_1 03:37:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x0, 0x4000000000000000}}, 0x18) 03:37:50 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:50 executing program 5: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000140)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="d9f1b716cf2a799342817a0601e29d19fb7224f33ed6265230eb8e5ad2cfa4cdb1b44cec18ee88218c898ac608ec9afc94174b9dcfa2d587646c77fb7c4c4d46e499b95da4c0417b5dd06a5d86f0488d1572619960314f2bdd629a9e892d285b22c95df0abe79c5b99f8f6176ccdf619ac2664a59768af0ffea41f1f3a9702e6289dd8ad04988fd8075d90967e263104a6d6bb928975f1b5f43c5cf55067c5df22451059778099e45b9cc27216", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001480)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001580)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f0000000140)='./file0\x00', 0x6, 0x2, &(0x7f0000000180)=[{&(0x7f0000000480)="9f76cf81b2f115e39422a82f5a7054b9d05113ff7819171ffab8ef54c3007e49880a91a4acab1c3e6e14b40f41589a242f600352d98e708d26e0e60e945acf5a2036373c0a472cfb18b65f3acf59998de86ebdff90a6e829154a040087830efd2953e2bddfa4538c7ac4688c40bb04f1175669b6a37d45b301ebef77e06497815063a794d9257d66d0d637ab7533ee59d99a1e69c6c92142c32691e14cb93b8b1d822d0f67d196c8c8fe32cf59b86264dfc03fcb7a5950fc04396142c5fa6ea1a83bf5643da81331d217136cedc38d9d1f12db8cc1c5e4c584fa368d64ad30694eddbd385bd1f1a43f59766790886d904fdb3f98a7c369ca2814790d155f297e73d556fb193d33d82623d2bc6c3fbb37b211df28bf64d8972094f86873ea5571da7f2d9a166bc404fef5de732a30b25927b8703138694999a4f8014ac48fa262a82b3a4166a9d0c414c504fa62527b1ba60944d78f3c75a081304a15975292dd9b5d5f4501e40e4071d118b51bad4be5c1bcf4b29b6f735db043f48f57dee3f5d016c79d9fd28e048a3a2ff76d3dae2794b8c132bc3b88525cde03f503ff28b8117a6026fb61280a30fb5b3a9e106f8e2460d0d16424e8228d3ade5dda8862969d6e626ba2dc6cdefb2bcc127454b6af9d632aaa6b49a26a9e4b034733cf7cbef437d68f9d46340fb47dbf5b9ce9c29d35895df15564c677551519b201f57cead3bfeb2a5c796574b86d7aa94180ff8559d80cc446984ff406dec742dce8d4e0876b5da4ccc86405aad5fd82fc3f7e1a3358a6ca63e3c29ab83a432935355250afb3c7448cfc425a1f187435362330a06d67f80d2fa3be5efff2f3a64875341a91768af7c8a52009c22a60a585ec0c622eaf5dd75f190309f86125dbb599f7d4f05360a15db7aee171645336e7f2031256d368a02b0f5fb5e57149c3513c97ce5eccf4cb79e936a009bc18d34e9c8c1027cf79f0cce38b3d5535fce2bead0d99e1071eb075b8b162e6f5c71e19de797aed072406e9e7906ecaeba2ac760bd5061345f803cfe9af7240d6f6787a2229555813a09c58bf89f835455f0b14d774df1f6399c5c2ec2c8e7587e5726b635a5bab128b6583ad7569ad19af40a4b021a7c04e3d4a6d59ca220b1a4ab5056a85f4f362f71e69b18ee8ffe16361302ca8ccf8f090029c548701f32ea2d3b2a3c6a22cee4b6f07f5c76a6f99268a945fa1a475c462114a637be482d2af60e504ade72c719e495ba13c419ebb92d38fdb5ee6e25b497342231d01fed6d5500c68f31f8c6085990aa75152d972af18c68a54ab3e9015cf4afcd4737ae96cab15cc573ed7a3a38408ef8ab8d154d2b026e07a286e86157bd5db23fd0f6dea17900993cf56d6bab920e81562a6db841ffdfcd44a91b4a4c4d978eb1ba9fae210e9243369bed477b53f583b0c5144cbfa77a3da3bcfb83a9bfe81c9b9f3907ffe1b8465993ff034feeaaa0ebac954e5bffacefaf7ca0d7e2d42f08b7195792c23945a5fbe0bebf9a8940fc4686d0e617e8481287a2ccaf195659ec04266be3c004af2cade5655e2e66662cbdc170de1a3c82e8d99621719a7e96c6980d8e942670a94e5fb7c8289a9a99a5782c249148b49bae4345289166b12bfa6e6179b3e8e130ef6913e8825ac5605bed63c41000b855fb9a2d254a411964d01716b4ea8e53bf62ac212369e4572085ad4666e90b4204ae7e9b4629a6c2928f94de231f9589c3243a8d7cb5d7494d8e41b5f3549a0b188dd8322b7771771ceca87c6f9126c11000f2a1ef955d0d3382dd18cf2bd334c80f39236b3a0f19e76f944c96a181a9604b3020a49a9067e8abf1feef0733eab291e47a15ea1aab79b0df5af9173ff9e7448e7feef146715d25f565c3825a32f6961720304efc9914481043f6487dca0aed7808ecc674a54ee96f688c5ca50d7bfd1ea41f01ba4d293f14164fc804d07228a38abed7c9c545fd6179a872ae6172c3ca64abacdf60273bc629c0dfe19f5cfafd8974aa8801ca0a8a6c77bfc6ebbbcdaee82cf8ac101dd06b205df14b2ae4b02e5911ec3ac065db8710a91d83d45dd9aa0877547e9a9eeeddca615ce75b8ce32135b52acf60d6569980975058833fb192504213ea098b2dae2f234855508a5a76ae3a75082bec321a4fa7611d8f766ac4eba34c99fcca7aca7baf99ed300a4becb35d937a8e0292eca989b1a3efa112d22881fc57ee2a188ce8cd90703473ff8741d5b17c193cdfdb3d134b070fb72bfda9ca3b3eddf01ee08503e480fc763d31f467bb92e21cd50d2480a5efe7f7beaa739c86865cc1ea88a8707c4e5d53d5910da76ee054fe04eba954abc7a1b021a5446291abe8de0d06c90c6abbe4177ea479143626105c6dc2a71fe8c839b1e49dba288df0d1edde30f64047b4760859a304464b5f124cdba1ebfe783dde13ce464fdaac5ad1970de905b4cf8e2d12bd81722101ef1830070b025baa118309d02859d71bebeb5b44c803447031896298d57ae2ace95a656891724f33f0bb5c2487abe88b8e7cfc0358cf2a25c4ccf2129bf8458793ca8267c12164aaebf1ee88d732dd04660d0da7611fc91f4b7703eb905ede6945a57c6bde703d579b98c25c21b2c9573898f5d54c4ace3a1c1710b9dddd4f27387260dd27bfb0e72948fbbf509d2e66c58a51a121a3d6025f503337df4f1e2cfe6f08b3d967afb466f0ff485fb6e7b21a6a15cd6fe4c08495bef64ea19435b903091ec372ca4b66adb28a2e9ee4b810cf4a587cb1b8ff8da2d32739fd7a709d334fcb5d46bd42e555307316fdc205f098885150e1e1a3f348aff6b75905179471a0cf08778178533100e0dd222d2ef06216540630cbd24d397e7df7599cf46f1db5f5e5a14fb31b5bed471170f2738eccf72ac088ef638a5ee57b7a8d9988235bf4588323f1dcadfa22a6ac1b034cc41222a95022227e5c0668d51fce9c6d9c654c63a727f86021a27b38963be262c872c0c32a9b01b882b815e338fa6c27c17324db0014f3bbebb98281e5957119d923f2fd2b58d749ae273384e862be30a8f4c82d4e4abb6579e1f0630550614b661b1887859c96f82ff8dae0869a256863db4739f10a732fc7944ceae3e87bcf64870317ff5876becc5313efbc2306905b02ec2f55a1326eef759a81c1ad8a0106f9f52a4405c7398142a9061424a520f655968d3d0a468d7ba4f8d1abfbcb96c38d5fadc5c183fc2437487f955636634500ce8416ad50b49a86fb530ba1822af5410b8436dbf18767816446fa15c74dc2a109c2ccbc7757915872b3c1ba5845e2f4e3023188d8c16adb1cd0282e4c053bec4239a4528dcc8fdf0048fd6995b84987c0813bba6c78a1bb15040e111e8f4c12d82964acda35b94e044a6ae4d2e7b64e7f2823cf4f1970b8bba51dddeb08bd93b65abe4cbd72259015bc6c1b3fb296a6026f8e5e13daa0f0f5dc03543eca810b877465f5c9ee93b8bb371239537c910cc12c864bd8ad4beeb506b8c12792f7d6e7e03faf196de8155ed34049516d55e5548d41097744be3fb8d26110cbb6ff65f2a8f3bba57b908241e165cb0c673b507b63fd11cadb232a9b3773402174a9ccac1310900cea99d6b1770e8a0e57229f593b35df9cde577dae254086221f5e350c68dae42ee6dca8048b34bc1bc7e64af25ab4be507aa0415f2a1cc6d1ecc783b3fb89c3012c026bcbe9f2554d3c674230487a7034cb05fe4d07a29a5e04c5ff7da6227b7d77d49f023684f084ad5c433da8b244006494aeb98ec8046cf633ba96f25c159bfd13935f57c0112abf1ae04d167cd0bb09889e75257b0888dc27d319a99786ce358d1c299c17f5c6f74d51deb21f77be5ca6b9abf4317e6114ffc5d7c14179f7b466ce609a9c29eb00c6ead4133916f8b7851b9a37360e89fa622e02a2d7fc6ee126bea2ce22d25c21c207fd78359ab3d5647b72c87b8b337032828a7c6e6041827f70057f2fef0f960bbce4ab7b975ed93dbdc67d9a151a695a0ebebedc783e8c53f20f7fd2da872909535f506e922db03985ae28afe9ed021d7cd83f64fb4bdc1f99130b15d85d957a173179bd0dbf35635adb613038b8923d35d656f5cb24df51f15158a924b55345d183b4822402e50938d5fc4c4c4e574e56060a5539aba1cd07627b49105a4feb26bcc88b24e706d8206377760c26669b6d19f178fa9d4ae898e7628f10b0c253e8644563f3ff6ff0a22027ad3675130a157b335ef9ad67aabaf416d9046617636efdfb908093786d22637e78772298a48d45825ff6891e479ac8065275c110a0649d8100ebc70fe22c9ab62261aced3d598c637e0f89478e1fb28501df07d47cf3af10c8371d8d612476be404782077cf39d245a84f536ee9c8116c6eb72704ebe9c0fb843bcfccc0cc460809e81769efbfc530c140dbe427b7703e3bc41285298d0d5512fd66f06bad0864b475d0762263a4219c9f8591c24c1e9eb4e8feb2196610c2692a98c4d0026a1eedb341388523a5e98b10aef8d1db41ab8580424a240b0bac8b5a44bf32c217f421b0d21c3af12368b8c50e962a40a65dcc3389da8cbb58461adc5a34935908a0ced1586c1d19e96c0d16bc3fef2d8a52831d3c15647be3d876f6e32165439bc2b460a99d1fa614a113c8da70bcc7a239fa3264d78e193b2531af011bcbcb0430edb41e8f3ba1e2507cf21441c0bb8a2abe958ea3f1c0b9bdb2c6c2ff13a13e40362f3f79a54c4f08abffb845bd1cf02e82b4858f24106c63b433c8a5288c3c71540e5d4ae415163fc1734e3ab7ecaf742ecc0538e9c7431edbfe97239b533f29f272c73aaed154f4592b245df0c3a00755aed68b456c1a5e968a32606d2925bff05a7e9f9e0453d84651efd7e4c7ff97c75f44d66e7a2a8e0c66134753b3663f4956a21918a8015b60481c3e516374757afb08738f528df444ab1b4344e054a9e855575c37f22bb5f967d27949a9e39beb2306b58458610bac3c6750cd4ef14f1669922275c52036723112b4978df72dc7585f5c09ec2ec6f083355c77f43f02fc609c1ba92d30cbcf065e8aa942f4f53bfad95c167ff7229073f11e63c2365d920fc62ffba4f6a85789406dae540ece8698a5766884065711e3868a6bf50478a1ab3ecd637c366bcc46184152a8f263cd66186494bd2525fc31717003624ed58efda0dad0affe24167077791ec4a45c1a6fba97759fddd766320237a45ca7a47f7525a5c417b1c2ade9f81b297f959477185e69885e00d713151db0a42bd00980dfc8339633abebcfe74a3afec4f1a1045bdccca626fd1458c73887ec5ac729ea4a722ad734732a93c93ddd90637f0892e70770c248b494df912ca27bb3c7d04f2d5c8cd92941ed1b5b34382c0ef977cf58b4b72e8171ac90b7f04577ae8119dd9975994e2d55e78bfe1a5f9c1d510b36853b29d602744aa8293af1e3b1e2c2c79466f676ffeb05394db3e04bee15b97bcf242aabde7d6d9e3baaa6b14a16c22f3035c41c7c261920eb5342520e2fffab0583cde69ea2671bcd61e30d56d9e017ecf55305760ea2181173312c8d8d0d6b1ca0919b896db0ead86f8b1a5c04da8b59e85fe4c4a889d71e77bf54958a2959040449b6317a66f6758f20a865f0e9a2d563437f9f9ec14a624fd49d539fffd68517b2fbda5187ea660be68e3dede314cb968a9dfb1a57407d24294a8c611cd7c0d5b797f19309b4c62aab06b52370631186a6751620fae6ce69116a7b4b8e309303ca0704b84d532fa288eb924e43cd7272cd5f30ddd1f4acf642a8eb23fb15e6", 0x1000, 0x30}, {&(0x7f0000003000)="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", 0x1000, 0x8000}], 0x2c01, &(0x7f0000000340)={[{@norecovery='norecovery'}, {@prjjquota={'prjjquota', 0x3d, '!'}}, {@noinline_data='noinline_data'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r2}}, {@dont_hash='dont_hash'}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, r3}}]}) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000040)={'sit0\x00', {0x2, 0x4e20, @rand_addr=0x4}}) read$FUSE(r0, &(0x7f00000080c0), 0xffffffffffffff30) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x7, {0x7, 0x40000}}, 0xfffffffffffffd81) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x4, 0x0, 0x0) 03:37:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="77033a47be52d77aaa31bd4eae7b05060b7e4b025075758d472c3a4030b137f63ce88498463436c953f7ddf2c7a919d36c0acde60ff576953ec938f93287a5941711577195378a98f91d16701e474baff3e1d3201f8140b4b1caa3a6e45c", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',subj_role=,[,euid=', @ANYRESDEC=r1, @ANYBLOB=',dont_appraise,permit_directio,obj_user=/dev/fuse\x00,dont_appraise,\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:50 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x0, 0xffffffff00000000}}, 0x18) 03:37:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\b\x009', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000480), 0x13d2) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:50 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0027f7736f02accea12f52ab2b0892ffb136"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x5, 0x0, 0x0) [ 631.093255] protocol 88fb is buggy, dev hsr_slave_0 [ 631.098382] protocol 88fb is buggy, dev hsr_slave_1 03:37:50 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0)=0x5, 0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643de9b15ad333ac756e0315186cf8ad4973ec629cfe716e6a7a00094a3d6a25cc9fdd576158df503ecd737bb86c8d6a670ec2641ba088bb307b1ba223bf54f2a844b39b3ff36cba00d7dd75c9cfb9a084681de876f5b7e122e531bb0af171d6b631cb861892dbcb4bf7eb1dc77a101f4e5b95a0c24d1181692271e2233fc8dada89297d8d0bcb25110ace1a97", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000000340)="6b1bcd79d6f95c1643e3bce1d957d48bf700f256bd9765dd7e1a2e8784a72fe72f3f7961b5ec9911aa79154182bb945ff67558c043cee7aaed15ff308643c97a2be4a15e77b6f88ae8b15ba0d510f101c98494e581b4827b5ae0874dc10407462bed47fee5c06b034466f39a90577dab1d5c144aed0b38f8aa3e455858da5b1ba7ca66d09eebdf6543e4492305d912bff14abdd573350a2955524f314fcd8ce71c1b9a99f963a78198cc3063f5baa1a7922bc18452f57a8a4f9a8188320c81a40b52ff099851245782a88ffa0bbd3d2f610645de396d98ce7bf3bd685707c4b68be7a7bc535d70", 0xe7) ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f0000000140)={0xe3, 0xa9ec, 0x9, 0x4, 0x6}) creat(&(0x7f0000000280)='./file0\x00', 0x44) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:50 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 631.573052] protocol 88fb is buggy, dev hsr_slave_0 [ 631.578223] protocol 88fb is buggy, dev hsr_slave_1 [ 631.583450] protocol 88fb is buggy, dev hsr_slave_0 [ 631.588539] protocol 88fb is buggy, dev hsr_slave_1 [ 631.593725] protocol 88fb is buggy, dev hsr_slave_0 [ 631.598793] protocol 88fb is buggy, dev hsr_slave_1 03:37:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/snmp6\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000580)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r0, &(0x7f0000000340)={0x78, 0x0, 0x6, {0xc, 0x6a, 0x0, {0x5, 0x3, 0x3, 0x100000000, 0x101, 0x1, 0xffffffffffff3e93, 0x0, 0x9, 0xd2f7, 0x20, r3, r4, 0x1, 0x5}}}, 0x78) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0xf) 03:37:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00004000e4af0dd593617edd448be63ca03c671874e25840556dcd734166221a6c26210203784b0f510c1cff2e1f6c22cd4d4fdeac9f06412f601fa585a14a36b11fa532d05bfe1b3ea9f949a572075a24d7b09a90176399ac93ae45064d42dfd4bab1b0f77c88ed55d5e1d476e8e71e650d975e4a48a5122ca9972b1e37a6078cfd60b81b1e46db9315cdc424655916cbf53fdab64a8b730057f5b47bb021e32a2ec66d11dc4a8fddefc4a619a31b01d580d249236169b0855db8c6ef0ceb5a96e59e84e2865b958ea6892e63bb6648afe08246d5b3f38cc78b8cbcbb8e33026c81d3fa05", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000140)={0x14, 0x49, 0x1, {0x20, 0x4, 0x4}}, 0x14) read$FUSE(r0, &(0x7f0000002000), 0x1000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000340), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:51 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c50000ff", 0x2e}], 0x1}, 0x0) 03:37:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x6, 0x0, 0x0) 03:37:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000480), 0xfffffffffffffcf3) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:51 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c50000ff", 0x2e}], 0x1}, 0x0) 03:37:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d2635f1e923bfc03dce9c675ab35f903267aad69119a0018000001cc8afb5954ce81f1c4e4deef73d0dc5de4dd8cf6daf04e16e658bffd80401e6275a5b556a52f09478956947df1d9c201fbd5e66e5da993cac120b4863099094d322bf4f0df4d59c4f53b47ad820eb8155c7f834e87b25c9f55034fcad7c0653e0cea627bdd8a148b019e6d843", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = dup2(r0, r0) getsockname$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x7, 0x0, 0x0) 03:37:51 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 631.985784] validate_nla: 16 callbacks suppressed [ 631.985802] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 632.001309] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfffffffffffffffa}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1400}}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080), &(0x7f0000000140)=0x4) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x8) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000340)={{0x1, 0x3, 0x101, 0x3, 0x800}, 0x5, 0x6e7c11d6}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") mkdirat(r0, &(0x7f00000003c0)='./file0\x00', 0x20) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000014c0)={{0x6, 0x4, 0x81, 0x7a2, 'syz1\x00'}, 0x1, 0x10000030, 0x81, 0x0, 0x1, 0x9, 'syz0\x00', &(0x7f0000001480)=['group_id'], 0x8, [], [0xf29c, 0x2d, 0x2, 0xfffffffffffff186]}) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x3, 0x420642) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000001640)=0x3ff, 0x4) r4 = mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x813, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000180)={0x1c, 0x0, &(0x7f0000000140)=[@acquire={0x40046305, 0x3}, @increfs_done={0x40106308, r4, 0x2}], 0x1000, 0x0, &(0x7f0000000480)="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"}) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) dup3(r1, r0, 0x80000) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="666439afa09495df989b10051e21b6d0d38e1644c6f8b61c8953d4652e212d6b0796d8e330cbf09d4abc83bf5c1507b5e40f98f60efaa8beb8c2bf0504c28b922b0ab1f4d3a995702184a49c6491add2bd27e496b6dd523b4cae78ac70bc4f386c53fa37bbce71b8c2ed9b81641191e0d4663e582c2da5774e5f621063673a08afb880cdd42bcb5e8fcf33bda4d7c39313d3c46b5157b94a3a5d251a9896f2db50fddbb97b3bba7783d4e56f10007e802b47a749334089de4bd76fb38f69f7ae17a2a51611905ecac31374d32a873110a06ff6f85758e84d0a8d1c48e122894a", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3, @default, @netrom={'nr', 0x0}, 0x8, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2000000000002, {0x7, 0x0, 0xfff, 0x2}}, 0xfffffed6) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000280), 0x4) socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 632.195988] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x10) 03:37:52 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500007f", 0x2e}], 0x1}, 0x0) 03:37:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x9, 0x0, 0x0) 03:37:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000480), 0x745) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000140)=""/20, 0x14, 0x100, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) io_setup(0x81, &(0x7f00000000c0)=0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff}, 0x84800) r3 = fcntl$dupfd(r0, 0x0, r0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x400000, 0x0) io_submit(r1, 0x3, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x7, r0, &(0x7f0000000140)="1178cbc1a56670061460beab872b5a8182dd19f190b7457d3a0ce28b8f504249764543a6c5ae2d30a38a1bb2244344834586314ce4b48f73f5846ef2b4c4ab90cc5d322fcc56d31b151c8f31a2d547c763b648f39119144f8ed453089ac49a6b617238990d6eebce0bf31376cd0013e28e8f7c4e486c516d151d809fd3b85af1d92538e30180cd73a74d71bc63c35e761cc570badb2d4379d1363424b18ba960285dfe27b5606a4db1d30674a0be63ca52fa4bd64fcf455e4cf239d723", 0xbd, 0x1, 0x0, 0x2, r2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0x6, r0, &(0x7f0000000480)="17ba197a398bbebd5ce73743680b87924d3e4974c2eb8a72c5f0bcb71b38c3837d9534e13e9b8f92f948290e9fee44a0370c3d18f4932d572f321272d9dc31823a4bd31e2af4645a43d74cf1f6abcf6ebd119bf93c0e2e378cecbac48175be0903d736792e0b263db97c8d5adb62400ad72f8895b3cba71d3b8d217091fbab30685287cfd2630cb17df2664946e9b2be7a466bebf248d273c5724d46642c06683d7546ed641b2f778714514d595ac4690c555c2605f7b591a01dd0e7e4206362f6a8038023ea78f880afe76decf2bd26057e380f8721d5a3dbd15a8c838eaef87eb65db5fe6d9d679654e6c8ae6e24b195", 0xf1, 0x9, 0x0, 0x0, r3}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x7, 0x5, r0, &(0x7f0000000380)="2df259d698b4ef9615f1d87b88be9e0ee7076f8825ecd39bca54", 0x1a, 0x800, 0x0, 0x3, r4}]) [ 632.658819] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:52 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500009e", 0x2e}], 0x1}, 0x0) 03:37:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xa, 0x0, 0x0) [ 632.830870] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 632.848082] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030f1313030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) r2 = syz_open_dev$sndpcmp(0x0, 0x5, 0x50b000) sendmmsg$unix(r2, &(0x7f0000000080), 0x0, 0x40000) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:52 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c50000f0", 0x2e}], 0x1}, 0x0) 03:37:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x200002d8) 03:37:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x400280) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000080)) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 633.102030] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xb, 0x0, 0x0) 03:37:52 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 633.324637] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xd, 0x0, 0x0) 03:37:52 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c50000ff", 0x2e}], 0x1}, 0x0) [ 633.521551] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:37:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mlock2(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x200, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x800, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000180)="64dea0d12b00000f09c4c1e173f489ea00000100df00c74424000c1c0000c74424020b000000c7442406000000000f011c24b8010000000f01d9660f201866ba410066b8060066ef660f3a20f012c4e2fd1cc4", 0x53}], 0x1, 0x0, &(0x7f0000000340)=[@cstype0={0x4, 0x5}], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x1ff) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getpeername$netrom(r3, &(0x7f0000000540)={{0x3, @null}, [@null, @netrom, @bcast, @remote, @remote, @rose, @rose, @bcast]}, &(0x7f00000005c0)=0x48) socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) readv(r1, &(0x7f0000001600)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f00000004c0)={0x1, r2}) recvfrom$rxrpc(r3, &(0x7f0000000380)=""/97, 0x61, 0x100, &(0x7f0000000480)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e24, 0x6, @empty, 0x9}}, 0x24) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gro5p_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000240)={0xd, 0x7, 0x1, {{}, 0x1ff}}, 0xd) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) set_robust_list(&(0x7f0000000380)={&(0x7f0000000340)={&(0x7f0000000280)}, 0x1}, 0x18) 03:37:53 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x14, 0x0, 0x0) [ 633.730391] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 633.826437] QAT: Invalid ioctl [ 633.933853] QAT: Invalid ioctl 03:37:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) syz_genetlink_get_family_id$net_dm(&(0x7f00000001c0)='NET_DM\x00') read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0xec3, 0x1) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000340)=0x5, &(0x7f0000000380)=0x4) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x20800, 0x0) write$P9_RVERSION(r2, &(0x7f0000000180)={0x15, 0x65, 0xffff, 0x6, 0x8, '9P2000.L'}, 0x15) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x50, 0x0, 0x0) 03:37:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x400000000000, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3, 0xa001) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000080)) 03:37:53 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:53 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7c}}, 0xfffffffffffffe2e) 03:37:53 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xc0, 0x0, 0x0) [ 634.519557] QAT: Invalid ioctl 03:37:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x8, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000180)=0x9, 0x4) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0xffffffffffffffb3, 0x1, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) r2 = getuid() getresgid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000580)=0xe8) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x8000, &(0x7f00000005c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}], [{@uid_eq={'uid', 0x3d, r4}}, {@permit_directio='permit_directio'}]}}) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:54 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="4e67726fc5f92cb7388946877c61ef1a27c8f5694eb273aa3dbbaf7049c596edf849c345bc60fb8b44c9a3165583dbedf99317a58caa77586e1c5b5087f14346d145d4a9b8a6ce88ed1f24c41655832ec49a70fdd01b58dff309dc9268195fe48c", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000140)={0x0}) mmap(&(0x7f0000dfd000/0x200000)=nil, 0x200000, 0x8, 0x14013, r2, 0x39) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000380)={r3, 0x4, &(0x7f0000000180)=[0x0, 0xfd, 0xb3dc, 0x1], &(0x7f00000001c0)=[0x9, 0x100000000, 0x401], 0x7, 0x1, 0xb7, &(0x7f0000000280)=[0x9], &(0x7f0000000340)=[0x5, 0x1, 0x1, 0x101]}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) [ 634.570485] QAT: Invalid ioctl 03:37:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) ioctl(r0, 0x3, &(0x7f00000000c0)="21ec92028a091891e498aef3d29eab9edd37bfb894d14617a6b3772b1f97ecd00465e2bd8bef3078791e577a02c13ce89bf91d0221d7b9c14d5f43") write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:54 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x500, 0x0, 0x0) 03:37:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) listxattr(&(0x7f0000000080)='\x00', &(0x7f0000000140)=""/11, 0xb) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="b26c4d170adc1ff60012a4915cb07000000000000000000000") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0xfffffffffffffffa, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:54 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200000, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)={0x1b4, r3, 0x30c, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bridge_slave_1\x00'}}]}, @TIPC_NLA_BEARER={0xd0, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x401}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffff9da0}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x50}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x10000, @dev={0xfe, 0x80, [], 0x13}, 0x9}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x26}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x81}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20000000000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) write$P9_RLOPEN(r1, &(0x7f0000000340)={0x18, 0xd, 0x1, {{0x4, 0x3, 0x5}, 0x80000000}}, 0x18) 03:37:54 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x600, 0x0, 0x0) 03:37:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:55 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x700, 0x0, 0x0) 03:37:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8000, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_DISCONNECT(r2, 0xab08) syz_open_dev$usbmon(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x113, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000340)={0xb, 0x10, 0xfa00, {&(0x7f0000000140), r3, 0x80000001}}, 0x18) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 635.628358] block nbd0: NBD_DISCONNECT 03:37:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7, 0x8000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000480)="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") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000140)={0x9, 0x0, 0x5, 0x2, 0x2, 0x9}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:55 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x900, 0x0, 0x0) [ 635.730964] net_ratelimit: 14 callbacks suppressed [ 635.730972] protocol 88fb is buggy, dev hsr_slave_0 [ 635.741129] protocol 88fb is buggy, dev hsr_slave_1 [ 635.746301] protocol 88fb is buggy, dev hsr_slave_0 [ 635.751420] protocol 88fb is buggy, dev hsr_slave_1 [ 635.756555] protocol 88fb is buggy, dev hsr_slave_0 [ 635.761667] protocol 88fb is buggy, dev hsr_slave_1 [ 635.782586] block nbd0: NBD_DISCONNECT 03:37:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000340)={r1}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x60}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [""]}, 0x1c}}, 0x4080) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VT_RESIZE(r4, 0x5609, &(0x7f0000000280)={0x5, 0x200, 0x33}) r5 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000780)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r5, 0xc100565c, &(0x7f0000000180)={0x0, 0x60a, 0x1, {0xb, @vbi}}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0xffffffffff7ffffd}}, 0x18) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) 03:37:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = dup(r0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e24, 0x5, @mcast2, 0x5fca}, {0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, 0x15, [0x8, 0xe64, 0x3, 0xfffffffffffffff9, 0x80000001, 0x8, 0xe970, 0x3ff]}, 0x5c) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x200, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0x8001, 0x200, 0x8, 0x583}, 0x4c, [0x1f, 0x2, 0x101, 0x3caa578c, 0x9, 0x8000, 0x3, 0x3f, 0x6, 0x3, 0x9, 0x5, 0xd2, 0x0, 0x4, 0x100, 0x0, 0x5, 0x0, 0x100000001, 0x8, 0x2e, 0x7ff, 0x4, 0x2, 0x81, 0x3, 0x100000000, 0x3, 0x800, 0x4, 0x401, 0x81, 0x7fffffff, 0x0, 0x754f, 0x5, 0x5, 0x824, 0x3, 0x401, 0x8, 0x4, 0xbb3, 0x7d, 0x7, 0x80, 0x8, 0x3, 0xffffffffffff8de1, 0x1ff, 0x3, 0x5, 0x8000, 0xffffffffffffffff, 0x0, 0x733e, 0x0, 0xfff, 0x6, 0x3, 0x401, 0x4, 0x200], [0x8, 0x5, 0x5, 0x23ae, 0x8001, 0x7, 0x10001, 0x0, 0xf29, 0x0, 0x2, 0x1000, 0x5890, 0x7ff, 0x8000, 0x1, 0x7, 0xc0e, 0x7, 0x20, 0x10000, 0x84e, 0x8000, 0x4, 0x3, 0x7, 0x782, 0x10001, 0x0, 0xbf, 0x59bb03b9, 0x7, 0xffffffff, 0x100000000, 0x5b, 0x906, 0x20, 0xfffffffffffffff8, 0x2, 0x5, 0x1, 0x2, 0x0, 0x9ed, 0x3, 0x3, 0x0, 0x0, 0x3f, 0x1, 0x2, 0x3, 0x1, 0xfffffffffffffffd, 0x1, 0x1, 0x8, 0xc8f, 0x8, 0x7, 0x8, 0x9e7c, 0x1, 0xfffffffffffffff9], [0x3f, 0x3, 0x188, 0x8001, 0x2dd, 0xfffffffffffffff9, 0x3, 0x7, 0x2, 0x0, 0x300000000000000, 0xbdb, 0x8, 0x6, 0x6, 0x3, 0xff, 0x80, 0xbd3, 0xc4, 0x20, 0x4, 0x9, 0x7fffffff, 0x0, 0x9, 0xffc1, 0x2, 0x8, 0x200, 0x8, 0x52, 0x2, 0x6, 0x2, 0xfff, 0x8, 0x1ff, 0x101, 0xffffffffffffff81, 0x1d, 0x5, 0x1ff, 0x2, 0x65, 0x1000, 0xff, 0x1, 0x1, 0x68, 0xe004, 0x6, 0x401, 0x8, 0x100, 0x1, 0x3, 0x2ea, 0x100000000000000, 0x0, 0xffffffff, 0x7d572646, 0x7f, 0xffffffffffffff99], [0x52d7, 0x24, 0x8, 0x6, 0x5, 0x6, 0x5, 0x9, 0x4, 0x101, 0x3, 0x2, 0xb5ee, 0x9, 0x3f, 0x8000000000000000, 0x1, 0x0, 0x8000, 0x8, 0xff, 0x7fff, 0x7f, 0x4, 0x40, 0x80000000, 0x81, 0x1, 0x6, 0x7, 0x0, 0x6, 0x43, 0x3f, 0x1, 0x5, 0x5, 0x80000001, 0x9, 0x7fff, 0x10000, 0x1000, 0x80000000, 0x4, 0xf46, 0x9, 0x6, 0x6, 0x0, 0x80, 0x0, 0x2, 0x4, 0x1, 0x3, 0x8000, 0x7, 0x7fffffff, 0x1f, 0x1, 0xe736, 0x3, 0x101, 0x100000001]}, 0x45c) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:55 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xa00, 0x0, 0x0) 03:37:55 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:55 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffd, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_buf(r1, 0x29, 0x3d, &(0x7f0000c86000), &(0x7f0000000040)=0x30) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="664ecd", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c77726f75cb0069643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) accept4$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000280)=0x10, 0x800) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x80400, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000180)={0x1, 0x0, {0x1, 0x1c, 0xa, 0x13, 0xb, 0x162f41aa, 0x0, 0xec, 0x1}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0xd7, 0x4, 0x100000000, "83e1bd3c663f85c93da5542808a98511", "a5b49ee4a89e06c50dcbe46e27682317987d4585620fc0cddbc6ba099161968e3708c8e117271771cb65b7e3b05ef455dcfa7d9578823d63758eb9820ff7b4a3816a6c5e2e5fff11a741aa2fee15667b38b177361cf46ecbbe1b89f8f35fd5b2f1d8a5d0dc5bc1a03ed88d8dd81ae4c015eed47bcd6fa3625123e677d7cd1fbb006045018f6f8c512f3e5ca7df046458d5fe3f8fc296ccecbdbfbb9b9929c9f6423a951d81d49bec3b86a2bffad949cea7f5ed27c7db193a0a5378052794d7db68a5"}, 0xd7, 0x1) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 636.610493] protocol 88fb is buggy, dev hsr_slave_0 [ 636.615589] protocol 88fb is buggy, dev hsr_slave_1 03:37:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x802) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000280)={r2, 0x9, 0x7, 0x400}, &(0x7f00000002c0)=0x10) 03:37:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xb00, 0x0, 0x0) 03:37:56 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2fe38cf7f31193ac94b4a30ef96c29d4b840d62372031cf70830fc932100177abd2187874bcc85dac93729a4830be1e82b136dd3b91e4efe2cc9f1106744dfbffa6006953586408e106ee6091f94e8e8997cae70fecb7983bae0cf3079c16178665aca40273a3969b17796f60b5c2d0eae6bce"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3ff, 0x238000) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000080)) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:56 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x80) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000080)={0x7fffffff}) write$FUSE_GETXATTR(r1, &(0x7f0000000180)={0xfffffff7, 0x0, 0x5, {0x7f}}, 0x18) 03:37:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xb0d}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) r1 = socket$caif_seqpacket(0x25, 0x5, 0x4) getsockopt$sock_int(r1, 0x1, 0x1d, &(0x7f00000000c0), &(0x7f0000000180)=0x4) 03:37:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xd00, 0x0, 0x0) [ 637.062313] validate_nla: 17 callbacks suppressed [ 637.062323] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:56 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:56 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 637.222031] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 637.325670] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 637.340162] protocol 88fb is buggy, dev hsr_slave_0 [ 637.345334] protocol 88fb is buggy, dev hsr_slave_1 03:37:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = socket$inet6(0xa, 0x8000f, 0x2) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x7, 0x0, 0xad19, 0x1, 0x0, 0x5, 0x5, {0x0, @in6={{0xa, 0x4e24, 0x80, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffff}}, 0x3f, 0x1, 0x8000, 0x1f, 0x6}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000280)={r2, 0x1f}, 0x8) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x1400, 0x0, 0x0) 03:37:57 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0xffffffffffffffd4) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) statx(r1, &(0x7f0000000180)='./file0\x00', 0x0, 0xade016a3ded41765, &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000140)=0x4, 0x4) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 637.916271] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:57 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x2000, 0x0, 0x0) 03:37:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="5c63db08c66e510274478a361ace75872a3c4061c164d33c72bcb2435dd31f1c5e47e56d63cb5133bb3d2ed7eef1bcfa256fee95e92cb761e87ed1e157384359fb1c213f300071164af5c676089a926c9fe2f3d15e30c3c2e67cae0269730e070430d2ea36a1475a430579fc840409868372286ca08c4c9f8d1b6a956039f867882ae23c637cf9faad0bd5dc5fbc70e5d2594837d051d94242fe5b93b59dbd047e67938be8dbb0c309"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x80, 0x0) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000140)={0x1, 0xe96}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 638.196295] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0xed9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000080)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:57 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="19007aa3faf4e6dc286d8077f4ad23e8090038aa2d050e710ec7da6eac6f22bb40edc8a31628f02b5450914c9d1d5a5b4bad7805793175093b4d36b306"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 638.387840] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:58 executing program 5: mkdir(&(0x7f0000000780)='./control\x00', 0x0) chmod(&(0x7f00000000c0)='./control\x00', 0x9c32f69e6caa24eb) mkdir(&(0x7f0000000940)='./control/file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) listxattr(&(0x7f0000000140)='./control/file0\x00', &(0x7f0000000180)=""/72, 0x48) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001004, 0x0) 03:37:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x3f00, 0x0, 0x0) 03:37:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x400, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffff9c}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2080, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000180)={r2, 0x80000, r3}) 03:37:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="660000d77f6f5c6cd6b16704d59c62b03efd2c47d158b3ca20da1fbaac59845e9a22bd45cac730b6fa7404cb920310c98b47ba64af3034f1c24548c850", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0100"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000440)={0x0, 0x3, 0x10}, &(0x7f00000007c0)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000800)={r2, @in6={{0xa, 0x5, 0x98, @empty, 0x1}}, [0x3, 0x8000000000000000, 0xa737, 0x3, 0x1, 0xffffffffffffffff, 0x100000000, 0x4, 0x8, 0x5, 0x5, 0x81, 0x1ff, 0xfffffffffffffffc]}, &(0x7f0000000900)=0x100) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") io_setup(0xfffffffffffffff7, &(0x7f0000000080)=0x0) r5 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x3, 0x800) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x133000, 0x0) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/enforce\x00', 0x400, 0x0) setxattr$security_ima(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='security.ima\x00', &(0x7f00000006c0)=@sha1={0x1, "a0064c45fedd0b224ba5a55712a58dd26ea1006e"}, 0x15, 0x2) io_submit(r4, 0x3, &(0x7f0000000600)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x20, r3, &(0x7f0000000140)="535d6b7c2d66f8d112908380d46470b011d121179a5dbff97157dbb515ffaab7d7f1b513a014f623b48b7f401ddc81989a0ce8a4894787f03d43cf94cf", 0x3d, 0x2fa, 0x0, 0x0, r5}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x8, r0, &(0x7f0000000480)="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", 0xfb, 0x3, 0x0, 0x3, r6}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x2, 0x8, r3, &(0x7f0000000380)="750d250e2dc14ba63434aa149b458274e1cf0e5b5d7eb5064cf1cfc88f9039384e04dff1e310449feb1a70df1ce1d08deac5d479bb4f0cdda484afb4e960985a2c7ac8ae995c8ced26c74def", 0x4c, 0x1, 0x0, 0x0, r7}]) getsockopt$nfc_llcp(r6, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:58 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 638.896475] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:58 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000008c0), 0x1000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000480)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0x258, 0x0, 0x258, 0x120, 0x0, 0x348, 0x348, 0x348, 0x348, 0x348, 0x4, &(0x7f0000000080), {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x1, 0x3ff}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @local, 0x0, 0x2, [0xa, 0x29, 0x2f, 0x3f, 0x11, 0x2d, 0x3e, 0x4, 0x0, 0x40, 0x8, 0x30, 0xc, 0x25, 0x18, 0x38], 0x2, 0xfff, 0x7}}}, {{@uncond, 0x0, 0x110, 0x138, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x12, 0xffffffffffffff8b, 0x0, 0x1}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x8, 0x5, 0x1, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x5}}}, {{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x10}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x6}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x450000, 0x0) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000180)={0x36d1, "abaa25d32467be6f7c95a7168ba8716b56e7380782ae8acde3028f8b2cf3ce97", 0x3, 0x1}) read$FUSE(r0, &(0x7f0000002000), 0x1000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0xe) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x4000, 0x0, 0x0) 03:37:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x8fa6}}, 0x7, 0x40, 0x4, 0x100000001}, &(0x7f0000000280)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e23, 0x4, @mcast1, 0x200}}, 0xfffffffffffffffa, 0x1f, 0x80, 0x5, 0x7814126f}, &(0x7f0000000480)=0x98) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x4000, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000040)={0x20, 0x0, 0x10000000002, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="66643d0bbe5df6fc9eecd4c9cdc5366456a081fcbfb169312c8fb453cfc27ec1bcb2ac466b6c9d56999234797bbd38d415e7fa8c99ff5b97c300e97591ccd6749c", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f30303030303030303034303030302c75736572447a3f46b85eb04208a3af827e5f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 639.176517] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:58 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 639.366514] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x5000, 0x0, 0x0) 03:37:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 03:37:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="b81e0c7d28c8f29e2a71cf7a5ee3ca7fea66988eafe33ad394080000006a75705f69643de8eac205c78c1e774fbe83293b10c636847e1fc72f1d02ea8e97a2eea5fe66feebef4240520dfe5ecba764c5f3ac797e515681772f199a89d1306dd35653c0cf0c0a21ed75d341b08bda137f8321280c9c2fd00957d73be2b57f4d4f3f77f0b57fbe5152dac950de4f5825512b8e806399ee5824c24bc3b0bf82e5244ea62547c3d3f3cba2978c17220fb68b251b71d8212e88f8ef5555e85bdb4c88e2df2e3ad5c9e89549d5b45db28212db3b6c121b7a9e632d83e73845e1f16605fdf5cd4c80ade299f41d1b31c5622f7279c934", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7, 0x0, 0x1}}, 0x20) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:59 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) [ 639.799308] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:37:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='Fa=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) flock(r0, 0x4) r1 = dup(r0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000140)=0x10) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:59 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:59 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x200000, 0x0) bind(r0, &(0x7f00000003c0)=@in={0x2, 0x4e21, @rand_addr=0x60d8}, 0x80) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000180)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="006d021c7a2ee9595a274a80f9b7a609", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x738) setsockopt$packet_buf(r1, 0x107, 0x0, &(0x7f0000000440)="0acf83c81c1ec14723ca3687d28856d194bae8e591d9d421ee00bd27552fb2defd34bf5be27ba57024e39546fae35607852501da1dfe329709bb64f80b083cd05b1f379728a4ce66", 0x48) read$FUSE(r2, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r2, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) lseek(r2, 0x0, 0x6) chmod(&(0x7f00000001c0)='./file0\x00', 0x21) write$FUSE_GETXATTR(r2, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f00000004c0)=0xffff) 03:37:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:37:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x60ff, 0x0, 0x0) 03:37:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="90ce726f75705f69643de7f1470465a371847ac6200d7a73adc2c4c95a5d93a7c7570eaa561608bddf85f5200c6388c343375ccd4ea5c179e4f1cb0aabdc3b2da8944a29c6abf3620c2bc25c3d384eb3c98247e57fc3fdc688579124642848c3c40972f50c6c2ada294cb0dee081ab64db626bd0e82e5ea36c783ddc1c7596a1ed6c34b2889df753e8c0795b81c6cd73ac204acf6a8a5002ba0e8177e8b712bbb3321361f2eaed62621d78d5d86deda269bdd31bf3c2cf2a858619e6c215ed40eafb8523ffa4", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x80, 0x20, 0x9}}, 0x20) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x210000, 0x0) recvfrom$inet(r1, &(0x7f0000000180)=""/119, 0x77, 0x2002, &(0x7f0000000240)={0x2, 0x4e24, @multicast2}, 0x10) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:59 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, ',keyring'}}, {@smackfshat={'smackfshat', 0x3d, 'audit'}}, {@fowner_lt={'fowner<', r1}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@uid_eq={'uid', 0x3d, r1}}, {@obj_type={'obj_type', 0x3d, 'user_id'}}, {@context={'context', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'rootmode'}}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='mounts\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f00000005c0), &(0x7f0000000280)=0x60) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000027000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@flags={0x3, 0x110}], 0x1) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f0000000480)={0xbfac, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xf}}}, {{0x2, 0x4e22, @loopback}}}, 0x108) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:37:59 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:37:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:37:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)=0x0) fcntl$lock(r0, 0x7, &(0x7f0000000180)={0x0, 0x7, 0x3, 0x5, r1}) 03:38:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x7}, 0x10) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x6, 0x20000) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000180)=0x200) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="66643d3b78192eec9e51fb04eaa3d9e952c6b11b39cd055126b3c35770b06aab96e93c2387a3795585a6327ba2a77b72c60df4d087b52e1d2d818f4afd247303dd5f0eff", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000c916, &(0x7f0000000080)="e98ea41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18, 0x0, 0x4}, 0x18) 03:38:00 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x9}], 0x1}, 0x0) 03:38:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x7400, 0x0, 0x0) 03:38:00 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0xa}], 0x1}, 0x0) 03:38:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 640.768427] net_ratelimit: 16 callbacks suppressed [ 640.768435] protocol 88fb is buggy, dev hsr_slave_0 [ 640.778556] protocol 88fb is buggy, dev hsr_slave_1 03:38:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffffffffffe, 0x7, &(0x7f0000000640)=[{&(0x7f00000001c0)="a79ef95df651829d098f29663ae8ac652fe4ceb5930429b5d1fbc5bbbb8134a4590ed1d5d4fab8c834788aaa2e9712adc447f79e08eca45605ff7ff132", 0x3d, 0x20}, {&(0x7f0000000280)='0', 0x1, 0xffff}, {&(0x7f0000000340)="ac823344f2f98b80e439e97567e57b5581ae67f5838a72925b030aa28fcfc90a688972f9e21a2383c1ab83eaa500d5c9cbc8365b326c19f96657552fd971b251951e973e794f676ba601aeb8bf4f1c583ad11c1168654c842b42ea7452c9c3d166df4fdff89ae36ace18ca547ec32f072c5b46877ac8d3a9a5ace00b597ece2a68fc07e6bb0dee29ceca614342753cb480f5c32979fc34d5709c0dd2b5348493bd1e83b7", 0xa4, 0x7}, {&(0x7f0000000480)="dcc402feb0db93ff3199", 0xa, 0x5}, {&(0x7f00000004c0)="eff682c512daa4ae75fd7398c2546e240e7e56bc9445ca90eedad8a2144d9c871572b6349f74d85fd1d7f8d5427262e40556e292a6fbed236ac58896d979baa7a7ec2fceece378498d788c6dcac724a1264b9c44cd3779680fefa16119127c6c60acacef", 0x64, 0x9}, {&(0x7f0000000540)="e1547d64c2cbb4d29d958ad9575b73", 0xf, 0x80}, {&(0x7f0000000580)="1963ffd746a89f1599757aa22bc0cdd351ffb2a52ef253e3612ddfd6f7c38fd3e57459936334339cd456b499bc080cb2a9633fb470cef9580bbffecba852b3828aeaa700b7ac5d5e1aa48902e7907f80a848672f9eef7671e635d707329f62add3dc24c329733fcb80c3460203cdb9d52e7e46759c9fa8084951fccb19b8fc6ddb34a65b1bbed7c8b4f2566ec5b99ea145f9e3aeb71005cce3624395178a4e623ad19a6b3eaf71258b", 0xa9, 0x5}], 0x300000, &(0x7f0000000700)={[{@type={'type', 0x3d, "65e37bb5"}}, {@umask={'umask', 0x3d, 0x3}}, {@force='force'}], [{@smackfshat={'smackfshat', 0x3d, '\''}}, {@obj_user={'obj_user', 0x3d, 'fd'}}, {@smackfsroot={'smackfsroot'}}]}) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x9400, 0x0, 0x0) 03:38:00 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0xf}], 0x1}, 0x0) [ 641.488050] protocol 88fb is buggy, dev hsr_slave_0 [ 641.493222] protocol 88fb is buggy, dev hsr_slave_1 03:38:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:38:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x200000, 0x0, 0x0) 03:38:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040100,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="e027"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$nfc_llcp(r2, 0x118, 0x2, 0x0, 0x2eb) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:01 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x14}], 0x1}, 0x0) 03:38:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x20, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) [ 641.967859] protocol 88fb is buggy, dev hsr_slave_0 [ 641.973005] protocol 88fb is buggy, dev hsr_slave_1 [ 641.978187] protocol 88fb is buggy, dev hsr_slave_0 [ 641.983284] protocol 88fb is buggy, dev hsr_slave_1 [ 641.988467] protocol 88fb is buggy, dev hsr_slave_0 [ 641.993575] protocol 88fb is buggy, dev hsr_slave_1 03:38:01 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x25}], 0x1}, 0x0) 03:38:01 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0xfffffffffffffffc, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000000000er_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643de1c12448b83a0e09b95cba48d9130142c9d14868ec717fd433f698287ed3c79a17553edd3ee45493db4e17eea7c5f8d76156298cd2171b32d539968bf27c1ab643e971", @ANYRESDEC=0x0, @ANYBLOB='\t\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000180)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e20, 0xfffffffffffffff9, @empty, 0x3acc1083}, @in6={0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1}, @in={0x2, 0x4e22}], 0x58) shmget(0x1, 0x3000, 0x82, &(0x7f0000ffc000/0x3000)=nil) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:38:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) write$FUSE_GETXATTR(r0, &(0x7f0000000140)={0xf, 0x0, 0x7, {0x800000000007d}}, 0x18) 03:38:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x7, 0x4000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x30, r2, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x80) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66d6a22af66ecd11263e24643d0000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getresuid(&(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f00000004c0)) r5 = geteuid() r6 = getpid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000e40)={{{@in=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000f40)=0xe8) r8 = fcntl$getown(r1, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001000)={0x0, 0x0}, &(0x7f0000001040)=0xc) getresgid(&(0x7f0000001080), &(0x7f00000010c0)=0x0, &(0x7f0000001100)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001140)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001180)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000001280)=0xe8) r13 = getegid() sendmsg$netlink(r1, &(0x7f0000001340)={&(0x7f0000000400)=@proc={0x10, 0x0, 0x1, 0x10}, 0xc, &(0x7f0000000f80)=[{&(0x7f00000050c0)={0x2068, 0x37, 0xb10, 0x70bd26, 0x25dfdbfb, "", [@generic="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", @nested={0x1028, 0x75, [@typed={0x10, 0x72, @str='/dev/dsp#\x00'}, @generic="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", @typed={0x14, 0x92, @ipv6=@ipv4={[], [], @multicast2}}]}, @nested={0x30, 0x82, [@typed={0x8, 0x3f, @uid=r4}, @typed={0x14, 0x21, @ipv6=@mcast1}, @typed={0x8, 0x5f, @uid=r5}, @typed={0x8, 0x4f, @pid=r6}]}]}, 0x2068}, {0x0}, {&(0x7f0000000500)={0x8c, 0x42, 0x120, 0x70bd27, 0x25dfdbff, "", [@generic="9fdf83c4bb2bc2290639990601b9299892cc051839aebeb1037f615f8933534c342a7814d3a8a8743cf3cb5626b4aa35d444946dfd6a2ea5db92afa01de965faf90f3639c0b7ee495518d3db005e0763b7e7d4cfda620e5e584797b77736ba92c671a72bceb6cf7dc5bb8850d7e238efd0c45ad6994e8d6fabfbe3"]}, 0x8c}, {&(0x7f00000005c0)={0x610, 0x3b, 0x720, 0x70bd28, 0x25dfdbfc, "", [@generic="8f3255955c98ec0189f2849d2c5e45a102993aaa4a86a3a2325682650e2a13c16ee361c86f992f9d81f5a1732adc5bfd01f6ee0b4cd05c37fdcd3d0947d2e466f547e0267a51e866830bb3a3c351f768424ab75a22afbf41251734d7e131d0f3d72d56e1b4b55a3bf0ac6771720ff0bbadc40bc66e7cbbe118450851d89fbb127fc2baa8b4e9cd9d81e08269143c45796c898332cfdf0186689ac0783b0ea4dc4981a5d87f4c2a2fce1b80b1753e2db9a414b595bb04474c6a95e61d2e593450996740063fa246bc72ed3a8491e322fb2c4656f50ea40f9f0da7267a1555301c7cd29107b527", @generic="f53414b7bd580b64ea47b205f83cda102a62a814f1bd25f79a3eefb7351b8145767bb6be8e007f8bede924deea3d6ccd69fdb952de2b39f7fab9f1f67d836f87aa261fb8b52fc3418001e164340d0a2c918d20d1467f0c57fc1ae454f3b66c7903c6017a23a0eff28bb54ac2dfcfa1fb9b0625527e8c45de71bb3229", @generic="d7aa39e82ddbad2158cfb052f80f5aa8ea57848f78708063353815fc3ef2b39e1a4ab5641071967d840d235f579c61df35b97178be5478325233c1b4373750f3b62db10b2623b7bb1baf4a8ae8179c1dab6dfa0375306aefe2ab4d4f9cbdbd71e5fc61eb366708f3019ce6a265c9", @generic="a617b399648bca6f", @nested={0x428, 0x33, [@typed={0x10, 0x1d, @str='/dev/fuse\x00'}, @generic="77744754ba021b8e0557433ec7113677ee54cb8450e2d5a62e6cd5140ce822e28c44d0fc50a87275b6cd765c9e2e578feb2db9a8a3f69c738addbde0eb4880121e0767f8e8c2ff084eaf540588", @generic="9a698c62dd3a804831398f7dece21bfa2d0a2f22472011e3aee159938038328497208ede181c06b9cd660cc4590f4712419d1b05ba971fec28acdc9e8ccbae6bd46e825a234362cd9a2ab06b5753fc36f5d88bc465349eb14002e5ebe85d35c9b6bcba7c0a8ee363f779760bea04923cf6168ee97190fe4043528dc912de6d1366ec18b4ee71bccb579ed5b6ed4e398af27987b5bb459a8b3266577a8b0f2befdfdef854f29b09014dbcc154955a27c98bef09e06730", @generic="02dfa194277aa97b31195b0a4fbd1fd652c2d924e43f8fac3eed32c4562177edeadec24f917a06048771165245b7168455da1d821843adc008aa8b39abacc395a459b21500ff3d6a296c51409ac8f84528bf7f683004f474c06127a0cdf2b563b37f06f8a3a0a9fbac951c0c6cfffb201baec391398b11afd11789970a13833d3deeb6ea79c8fd4204de9c069cfc53f932d96e2cac9cf5ebe0c57e750897558307a3b43259ce20d7e5ca167ab0f67d81e1fe80f10eafb356fb9b2c373db7a73e65502044d2316ee9176f5e99c3890d9bec3d", @typed={0x8, 0x35, @fd=r3}, @typed={0x8, 0x19, @fd=r0}, @typed={0xf0, 0x1d, @binary="03ce806811302c15a7d241514172ee05a0814a80470ab92af219fb2aefad4c9c989dab146a13c4a959eb7add4737be3a0f1ba6979f408a1966bcea4d87f385da022bde92cff6da4f7491ec703e2bbc083dff576d1fca03f17a5280d41bb8cfb6804e76b2b27e26535b29ce4f896686909ea8f3483f44b1097674202239c88bee1b852deecca9e6c57ee2b5c896774cf1e8c9773f697abb80347e9d60fa1ddafe6b8be605aafdc65f06a54a034e38615e2e63365f7742a3b9f550c98f128490964d54fc2a070712378b93a45fda757eb9249347d3e4dab3483df6850e4b29aa308ce5730c051d29f6b8afb1ba"}, @generic="b0fd0d2b4c152445932bb84ad82f62117468895483ac3463c977ccdd39d2fd846e21cd843d228d3bbaf90bc9bac74d5df398dd77600f307c4a29335c4eb8b9c02b09ab03972c1f023665244319b2fd250c74990d201f55fbcfb4f1ef50a5017e9406f20abd8b24e9755975dfa83292c0172f078b4677003234d6082583b3bc4df6312ac9a7cb0e8876117bff2012628a6bd02d5431357209082aee610b01fc181c682289b460e2fc2c7d95670aa3b4fa6534968980eaf4b3662df81341baad33dafea8f60f71fc3e6127", @generic="c2cda0926322d8f7c09ee370ababb47c0e197d3337f650a8c024147f3686b4c00d9d06b745364218eb6e72bd5bc033c2fd021323f88a2877eaa124c5f20ca9e494e6b7774cf3f80b12949a4e2b813b517ce3946a428860394dc3ae14bff54dbf3752ee931dd42380d84fc57872a1492f0be891"]}]}, 0x610}, {&(0x7f0000000c00)={0x198, 0x2a, 0x120, 0x70bd25, 0x25dfdbfc, "", [@nested={0x178, 0x42, [@generic="de02ecb6ed8163865a1bedb83990489ac7201b219861987a88d351302a254dd23315310059e693dc3f34bb90b7e1628c584658d09d998777c5f371bf8b6fc5153be8fe86d61a4847b459ab3a3270bd6905a5355fbd37658c04a84beee62eb9adcd2efa8964b428755ba88d9850998af64e74da495d3f3a566b183b71a759e4cccdee45990899b864e51c52a7e99361eb4e4b385a8eef80bc76ab92a6eea73bf9212ee0d7017eafde8fd275b1002a6a3d10f71cf645e5da8352704eb54e8f9ff4104ed60d7ae1bf3eb3674160fa3aa864542834b60c122664a8085a8c98026ef7af9558b5191e159813cbac", @generic="ef85f247d3564d056fae3455f2ff1015a530ecd29be347d200c0a266b2817da5e34b25b1ff70250f4ee7c37da82872339b12548f6d7914313e10da9703cd7b5458a920ebcef12b629297736b53bec71d05a6a50b447edd11339497e4486d8f4061b466e1ea7d1bdc0d52043f7d94b08be69d123838f677ec3ef0d37ba87e22bc37de30", @typed={0x4, 0x73}]}, @typed={0x4, 0x23}, @typed={0x8, 0x78, @fd=r0}, @typed={0x4, 0x41}]}, 0x198}, {&(0x7f0000000dc0)={0x68, 0x1c, 0x600, 0x70bd2c, 0x25dfdbfe, "", [@generic="b0d2c4bd88a808b37a130e3225fa3a53711e675440b1d810e7738b56df31c05c2462c63b6e5149697d9476cd49f3c3a2baad976cd911a83d10fe6dd1be57909869862e8acd9af868ba46ea8c4d3b96e18269b5304e"]}, 0x68}, {&(0x7f0000007140)={0x12e0, 0x13, 0x800, 0x70bd25, 0x25dfdbfc, "", [@generic="9fa905ce0d", @nested={0x1230, 0x3b, [@generic="652ce83cabad31a8e077deaef64931ed11b5997684fd2b40b65298d8fe7e63686df2f7b724f825aebd2e59d1580f67c6c324acd3a36f8e6af36181442f13711e26d8b76ef772ed6dd06f3174fe3ca53282fa6016b43fe8832ed755c078feb8709bc47f31bf91d02e6e2c51bc6a255089b2884e8775c5c96d7d356540c7db74834f7c9a1e4d9d1f76c98a1c22fcc3fe73cbb585b68b0ac70841b6b76feef916be2c391a75e9401d0fa85cbd552aee0ebf150f3a657485ece4d19a8499eb89f0381085af6efb2994a08f867c7370a81d4bd808", @generic="ec30a62f58772f120ec90dc83c50249b3ea1ee593e1310012aa78c7a", @generic="700fdd847a9a15901dbfd24dd14ca26a51fcd47d6fc503d6dbc25c7e28582bf85151dd1e7a7c5b2680f60ad454c437161c674851f1b6c3bde74d6626e6161b6aeabf0a7a3d2ba76d03971f415ec7f22727fc19af56c252ada7c1aae48979967e8bfc189379", @typed={0x6c, 0x1d, @binary="ef5616f34e651954719d8550bdb018592fbca52ee366a723c9a9a81623055b067143aca4f9ee697de5d5a6cd91aa0692aa7f622736d7a0efd1506952871455faff89d3509fd72c146ee0aa3c30032b87eedc11091301a88f7d19b0f84b1fb555478114d427c0ad"}, @typed={0xc, 0x81, @u64=0x8000}, @typed={0x28, 0x0, @binary="335740a1c597adb8e1eb1eb181549230555b9bc5501f7981624a932420f18f715934"}, @generic="1206efa2c6fce24b3f1d61c1e1943e039e50d170d42b16c512e47934e83260872faca9b1da5804c47e25cd53b69952aef5", @generic, @typed={0x8, 0x77, @ipv4=@broadcast}, @generic="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"]}, @generic="50bef85979d73e4b1b289d419a13035d6bdf802ffbbe21d8d8ac2a", @generic="6577e01a831d3fc4dc334da98bc746440fe16d028a08b035ea234eb32dad88e485bb4e89b4b240e0226952735a9eb4472e801c0e6e6c9bb74dedf440a2fc807d9011f6c167007819f746b16e5d0bb38306feeace1879e64bf4042cfb43e0f56e50151a0cda1165fc03172a7589e42779ae77c16940f8c7efc9595cb28d8b"]}, 0x12e0}, {&(0x7f0000008440)={0x1310, 0x1d, 0x901, 0x70bd2b, 0x25dfdbfb, "", [@nested={0x48, 0x8e, [@typed={0x8, 0x83, @ipv4=@rand_addr=0x9}, @generic="bc2176548d21b46a", @generic="36c09408d25f49618876d0fbbda68aa3c1709e5e35304abd60124a7ba97e81d45f506be4c548ea225bfe1ac3e9cc9bf206a3afa8"]}, @nested={0x2a4, 0x6f, [@typed={0xc, 0x1e, @u64=0x9}, @typed={0x8, 0x3, @uid=r7}, @generic="5e7132b3712d8830816283705451fe506607335c79918c11c40f2a4c40f72fce862ef87d11", @typed={0x14, 0x4f, @ipv6=@local}, @typed={0xc0, 0x48, @binary="9bd0eb85baaf40d0a1ccbd51852c0119001b50d9324f292dd0509ff7decdfb50ee55b191708ee1aeaf7a15c93e55d34e584dc24298bc1d85e0718901fd69eee3e68082bcc90a090b4f65f3cac3ed0fa3f416a1f1907e417361055d5f2d65dd8f20e158f9c84581610d4e3a91f53a2525ce426f69ef9bdfeed315015352b2eef38d6c6c462f215e9e9c598b9d9aab3b0eb71dfae585f15c5437dbca5c6cd4f4ce23c8661fafcf16e9e6b0b48154fce51f8bcd6e4684c52f3ce3"}, @generic="f6e5f404f5757aad3c209a0878510b3770eb5ccfd125f0fd9dbd4ddc0f6f234385bfee4fd481fa0e88df0b09a34bd19029860b67c4156e93636245269c233f64706893b42d25cddf8b28e18faefa5cd1d7582fd16e4d10cba82402b42a40810580054910876cb7082620436ad0cdd11d88efc4bcb8efcdca88b73f4f0bba2d98d03d40a267d1340d369de919c9c166f8511384fbbef7e57ebf", @typed={0x8, 0x2e, @ipv4=@local}, @generic="ecdd91baeadaf400edf7ddfddf34fb5f28d4ccd899bd34b19a1597b7544f7a2915e126a91cf2d4cc00e6c0c6d08bce746b078134ae715d08060fe8113750d7366c2f7323a2fa1875ae2f577e203fde0057fe26b3b7a2763347382b514fba8ca92f8fdfe5e3fb5f87a02c8de4728e7385c9d5cb1920e5e2f29aad095133d5286ac42c94ad451edaed599147e087bc4fa7b3d184086429ed689237038d430e4f50f254830ff81b7151b81363f25e005ff0476d92ad1e1bcdb378782cdde831fc4993ac81fe5b962f3d5bc2e388f05a9b0fd7d2be3b8299d5f6e291e047d430bcec8775fbc3", @typed={0xc, 0x7d, @u64=0x7fff}]}, @generic="1e36edb61303d99acc20cbaa7da02e00b1d6", @generic="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"]}, 0x1310}], 0x8, &(0x7f00000012c0)=[@rights={0x20, 0x1, 0x1, [r3, r1, r3]}, @rights={0x18, 0x1, 0x1, [r3, r1]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}], 0x78, 0x44}, 0x10) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:01 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x30}], 0x1}, 0x0) 03:38:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x307100, 0x0, 0x0) 03:38:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x115800, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f00000001c0)={0x6, &(0x7f0000000180)=[{0x9, 0x6ef55d6f, 0x6, 0x9}, {0x1, 0x81, 0x7f, 0x8}, {0x100, 0xff, 0xc2, 0x400}, {0x1, 0x7, 0xe2, 0x6}, {0x40, 0x100, 0x8, 0x4}, {0xcb, 0x3, 0x7, 0xffffffffffffffc1}]}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x10000, 0xc4400) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f00000000c0)={0x3, 0x0, 0x2}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$P9_RFSYNC(r2, &(0x7f0000000280)={0x7, 0x33, 0x1}, 0x7) llistxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0xaef70361b1b473bc) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) 03:38:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 642.439027] validate_nla: 2 callbacks suppressed [ 642.439037] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000001c0)=0x0, &(0x7f0000000280), &(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) getgroups(0x1, &(0x7f00000003c0)=[0x0]) r6 = geteuid() getgroups(0x5, &(0x7f0000000580)=[0xee01, 0xee01, 0xee01, 0x0, 0xffffffffffffffff]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@empty}}, &(0x7f00000006c0)=0xe8) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000880)=0x0, &(0x7f00000008c0), &(0x7f0000000900)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xe8) r13 = getegid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000bc0)={0x488, 0xfffffffffffffffe, 0x8, [{{0x6, 0x2, 0x9, 0x100000000, 0x3ff, 0x8, {0x1, 0x1, 0x3, 0x0, 0xf6, 0x100000001, 0x1ff, 0x5, 0x3, 0xb8f3, 0x3f, r2, r3, 0x5, 0x7fffffff}}, {0x3, 0x8001, 0x7, 0x7, 'user_id'}}, {{0x1, 0x1, 0xf39, 0x8, 0x1, 0x988, {0x0, 0x9b, 0x4, 0x22, 0x6, 0x3, 0x8, 0x8, 0x5bd, 0xfff, 0x80, r4, r5, 0x1, 0x7}}, {0x0, 0x1ff, 0x2, 0x1ac3, 'fd'}}, {{0x3, 0x3, 0x4, 0x4, 0x100, 0x100000001, {0x4, 0x7fff, 0x7fffffff, 0x5, 0x7, 0x7, 0x80000000, 0x1, 0x7, 0xfffffffffffff016, 0x800, r6, r7, 0x8, 0x8}}, {0x4, 0x7, 0x8, 0x7, 'group_id'}}, {{0x5, 0x0, 0x5, 0x800, 0x1, 0x1, {0x5, 0xd599, 0x0, 0x7, 0x8, 0x8, 0x1, 0x9, 0x5, 0x100, 0x6, r8, r9, 0x1f1260f0, 0x2}}, {0x5, 0xa717, 0x5, 0xffffffffffffffff, 'fuse\x00'}}, {{0x2, 0x1, 0x3, 0x7fffffff, 0x4, 0x4, {0x2, 0x3ff, 0xffffffffffffffff, 0x0, 0x1e, 0x81, 0x10000, 0x1, 0x2, 0x7, 0x3, r10, r11, 0x1f, 0x4}}, {0x4, 0xa0, 0x12, 0x6, '^{posix_acl_access'}}, {{0x4, 0x1, 0x101, 0xff, 0x1ff, 0x10000, {0x2, 0x5, 0x2, 0x9, 0x1, 0xfffffffffffffffc, 0x7, 0x1, 0xffffffffffffff36, 0x7ff, 0x3, r12, r13, 0x2, 0x100000000}}, {0x2, 0x1b, 0xa, 0x9, '/dev/fuse\x00'}}, {{0x6, 0x2, 0x0, 0x3f, 0x7, 0x9, {0x0, 0x7, 0x0, 0x1, 0x8, 0x586, 0x3c4e, 0x9, 0x2, 0x1000, 0x1, r14, r15, 0x5, 0x2}}, {0x0, 0x2, 0x7, 0x6, 'user_id'}}]}, 0x488) [ 642.499670] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:02 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x51}], 0x1}, 0x0) 03:38:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x48e200, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3738}]}, 0x38}, 0x1, 0x0, 0x0, 0xc001}, 0x40004) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) [ 642.683849] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000480)={0xe9aa, 0x7, 0x3, {0x6, @pix_mp={0x8, 0x8, 0x30377f5d, 0x7, 0x0, [{0x9, 0x400}, {0xffff, 0x8}, {0x7, 0x40}, {0xd1a9, 0x7fffffff}, {0x7, 0x9e}, {0x0, 0xfffc}, {0xfffffffffffffff7, 0x7}, {0x40, 0x3}], 0x80, 0x3976, 0x4}}}) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000140)={'teql0\x00', {0x2, 0x4e22, @local}}) 03:38:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x400000, 0x0, 0x0) 03:38:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) 03:38:02 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x63}], 0x1}, 0x0) [ 642.825316] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000080)={0x7, 0x2, {0xffffffffffffffff, 0x3, 0x7f, 0x1, 0x2}}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7, 0x0, 0x0, 0x5}}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:38:02 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0xc0}], 0x1}, 0x0) 03:38:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x50a000, 0x0, 0x0) 03:38:02 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x223}], 0x1}, 0x0) [ 643.043881] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="1567726f75705f69645d4e9b0688cae0edd91783b5ea", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 643.191448] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 643.215934] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x6b6b6b, 0x0, 0x0) 03:38:03 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0xec0}], 0x1}, 0x0) 03:38:03 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x450483, 0x0) write$P9_RREAD(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="980000007502008d00000016132f52ba2fc4c1c396689bb7ca10b203cb88d3dac1377a584e7ccd67aa05980dc5a856966ea1f5299972c770c8cd08dcb297a489b94627a666ab75b2f5458c25eeef6146fa818abe05f1bd88ea2a6d50aa48d058619c050b7204b39fa6a0975e53803c94d8e035a7c7944364aef0b64f408293b9a3e816a1c2167ff1436c2215880871b8da5c9a5fd3638600"], 0x98) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB=' \x00\x00', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="b8d8905ad5f06b9ee163e2bf6e94809ee0dff91b4e8d90ecd3674130c6dd2c6c1144d639a6c207b3b17d409d6e0891bfec674d158205c8e3ddd51b96dae033dc8b97509dbf6f6ca872c5bc90c948a226be71ae00560c68ab9ad1c0a868ec2f88a9dec697c9d13309cc8f74ca149986619dd158977c18d8efe268373d68c5a1e910ee6b438792ab131f860b6b658978a2333faa1f980c4b75eaae3389cf7739b699a3c9b2e5707ce41694f88e3cc2667e50e2b8cab3f5d9d77ec3a5c442308de726a7242dc58cf4ad15a12d89621e442c1aada908d57692611478a1a507d5124691abff5bfab60cf61a858c"]) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000180)=0xc) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000000)) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 643.586194] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 643.600101] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x70a000, 0x0, 0x0) 03:38:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) socket$xdp(0x2c, 0x3, 0x0) 03:38:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x10000, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:03 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r2 = dup(r1) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f0000000080)={0x5, 0x8001, 0x7d, 0xff, 0x3, 0x1}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000340)={0x5, 0x1, @stop_pts=0x2}) read$FUSE(r1, &(0x7f00000060c0), 0xfffffda2) read$FUSE(r1, &(0x7f0000002000), 0x1000) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x9, 0x3, 0x368, 0x0, 0xb8, 0x0, 0xb8, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x2d0, 0x2d0, 0x3, &(0x7f0000000040), {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffff00, 'netdevsim0\x00', 'veth0\x00', {0xff}, {}, 0x7e, 0x1, 0x2}, 0x0, 0x98, 0xb8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ip={@multicast1, @remote, 0xffffffff, 0xff000000, 'veth1_to_bridge\x00', 'caif0\x00', {0xff}, {0xff}, 0x62, 0x1, 0x55}, 0x0, 0xf0, 0x218, 0x0, {}, [@common=@inet=@tcp={0x30, 'tcp\x00', 0x0, {0x4e22, 0x4e24, 0x4e21, 0x4e23, 0x1b, 0x2a, 0x5e, 0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x3}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x2, 'system_u:object_r:sshd_key_t:s0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:38:03 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x33fe0}], 0x1}, 0x0) 03:38:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x713000, 0x0, 0x0) 03:38:03 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x7, 0xa00) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x9, 0x1ea5}, &(0x7f0000001480)=0x14) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000014c0)={r1, 0x10001}, &(0x7f0000001500)=0x8) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f0000000480), 0xfffffffffffffd13) write$FUSE_IOCTL(r2, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f0000000340)={r4, 0x7, &(0x7f00000001c0)=[0x9, 0x4, 0x3, 0x7, 0x9, 0x4, 0x5], &(0x7f0000000240)=[0x40, 0x8, 0xc8, 0x3f], 0x51, 0x6, 0x3, &(0x7f0000000280)=[0x3e00000000000, 0x1f, 0x3f, 0x0, 0x5, 0x1f], &(0x7f00000002c0)=[0x4]}) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d75bb4fbdbfc79aa1f81a94157e9faaf5", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 643.971665] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d0aeeb24fddbd46903030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:38:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x740000, 0x0, 0x0) 03:38:03 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2000022e}], 0x1}, 0x0) 03:38:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ebc02d5955d9434680e7324041eaa7d3d8f0", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7, 0x0, 0x0, 0xff}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x301000, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000001c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800040}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, r2, 0x0, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000001}, 0x4040) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x8000a0, 0x0, 0x0) 03:38:03 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x7ffff000}], 0x1}, 0x0) 03:38:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) 03:38:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = dup2(r0, r0) write$P9_RREMOVE(r1, &(0x7f0000000080)={0x7, 0x7b, 0x2}, 0x7) read$FUSE(r0, &(0x7f0000002000), 0x1000) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) ptrace$peekuser(0x3, r2, 0x6) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x7f}}, 0x18) 03:38:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:04 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0xfffffdef}], 0x1}, 0x0) 03:38:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x80ffff, 0x0, 0x0) 03:38:04 executing program 4: r0 = socket(0xa, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 03:38:04 executing program 4: inotify_init1(0x200000000080000) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x100000000000010c, 0x0) 03:38:04 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x2}, 0x0) 03:38:04 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x8}, 0x0) 03:38:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x940000, 0x0, 0x0) 03:38:04 executing program 4: r0 = memfd_create(&(0x7f0000000180)='\x87', 0x2) fcntl$addseals(r0, 0x409, 0xb) io_setup(0x1002, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)="92", 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 03:38:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000240)='\x00', 0x241, 0x3) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) pipe2(&(0x7f00000000c0), 0x80000) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:05 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0xa}, 0x0) 03:38:05 executing program 4: pipe(&(0x7f00000005c0)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") readlinkat(0xffffffffffffffff, 0x0, &(0x7f0000000380)=""/122, 0x7a) 03:38:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xa05000, 0x0, 0x0) 03:38:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r3 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x1, 0x2000) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0xc8001, 0x0) r5 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vfio/vfio\x00', 0x4001, 0x0) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x88, r2, 0x500, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7fff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7d1d}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x400}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r0}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000}, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r6 = semget(0x3, 0x0, 0x410) ioctl$RTC_UIE_ON(r4, 0x7003) semctl$IPC_RMID(r6, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030010000000000000030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffffffffecf) prctl$PR_GET_NAME(0x10, &(0x7f0000000080)) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000010000003a, 0x1, &(0x7f0000261f44)=""/188, &(0x7f0000000000)=0xffffffffffffff79) 03:38:05 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0xd}, 0x0) 03:38:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d0a90504b1224246c7c0185f697789b6cc3b559cae6e3a84417be9e6cca7badc50f456b559f8a061d1fb13f123419dbf6f0181a8e11c24ecd48017c78e2f42140d83d204ef7e8fd28b997801a853344a14b414400c0ad923f625a90665f41bffa03df3de69247c8de0c7e805050e0ca5188ebca8da2ebd4a0cea25810698c214bf6a4626cc194a2f95f36e82aac4d9848a174605083a8315dc5cf722a952625c2405ad4679bba4eb6a55d759e99c1770005a0ea5dee", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) keyctl$session_to_parent(0x12) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xa07000, 0x0, 0x0) 03:38:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='&']}) [ 646.125755] net_ratelimit: 14 callbacks suppressed [ 646.125763] protocol 88fb is buggy, dev hsr_slave_0 [ 646.135972] protocol 88fb is buggy, dev hsr_slave_1 [ 646.141120] protocol 88fb is buggy, dev hsr_slave_0 [ 646.146282] protocol 88fb is buggy, dev hsr_slave_1 [ 646.151450] protocol 88fb is buggy, dev hsr_slave_0 [ 646.156591] protocol 88fb is buggy, dev hsr_slave_1 03:38:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = dup2(r0, r0) bind$llc(r1, &(0x7f00000001c0)={0x1a, 0x0, 0x6, 0x800, 0x10000, 0x1f, @dev={[], 0x25}}, 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000p00h40000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setxattr$security_selinux(&(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000380)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:v\x14l_device_t:s0\x00', 0x22, 0x5) write$smack_current(r1, &(0x7f0000000280)='\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0xe) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000140)={{0x77359400}, {0x77359400}}, &(0x7f00000002c0)) 03:38:06 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x25}, 0x0) 03:38:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) socket$xdp(0x2c, 0x3, 0x0) 03:38:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x2, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000001c0)={0x4, &(0x7f0000000180)=[0x20, 0x4, 0x3, 0x2]}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") fcntl$getownex(r0, 0x10, &(0x7f0000000080)) r2 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x8, 0x200) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r3, 0x200, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x800}}, ["", "", "", "", ""]}, 0x24}}, 0x4) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xdae48bf306988352) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x20000, 0x0) 03:38:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x1000000, 0x0, 0x0) 03:38:06 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x51}, 0x0) 03:38:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x1000040, 0x0, 0x0) 03:38:06 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x9, 0x4, 0x401, 0x7, 0x0, 0x0, 0x5800, 0x2, 0x9, 0x7fffffff, 0x3, 0x6ba, 0x9a21ffd, 0xffffffffffffff64, 0x100000000, 0x7, 0x3, 0x1ff, 0x401, 0x0, 0x2, 0x1, 0x400, 0x6, 0x8001, 0x6, 0x7ff, 0x6, 0x1a71, 0x2, 0x5, 0x46, 0x3, 0x7, 0x0, 0x40, 0x0, 0x6f8, 0x1, @perf_config_ext={0x1000, 0xee6}, 0x10004, 0x2, 0x4, 0x4, 0x9b, 0x1, 0x4}, r2, 0x3, 0xffffffffffffff9c, 0x9) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:06 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1}, 0x0) 03:38:06 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x300}, 0x0) 03:38:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f120d5f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x800, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7570963c2c7ae4894814dcec175f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 647.005311] protocol 88fb is buggy, dev hsr_slave_0 [ 647.010503] protocol 88fb is buggy, dev hsr_slave_1 03:38:06 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x200400, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0/file0\x00', 0xfffffffffffffffe) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d303030303030303030300630303030303030343000000001000000075f69643d41ce5f6fd17e2a1d6bb4c10fa96017db120718ef84495afa7a312dd571e93148c78650fc86cb6a18328115d86a3c4f8d396d9b8f87aedf9170af08853e0b1195905676294710e46ffd7708f422fee310de2dd9e06057fc3105eb954de135025547acf03e5a3e850f979ce4c85dc47a734061c8752d9c20", @ANYRESDEC=0x0, @ANYBLOB="2c47726f75705f003c83", @ANYRESDEC=0x0, @ANYBLOB="c23128e58e25e3b0fed1c3a423b4fc53d14ad800711813cbfe8e24d0f175ff9cecc506ac09750524a799322326dfb995589979a08cc5119980f7e497d2c8ca7e95519a0bc7787324b91bc9cde85c1d9a97069922"]) read$FUSE(r2, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r2, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000000)={0x6, 0x100, 0x10000, 0x0, 0x2, 0x3, 0x6, 0x2, 0x1, 0x6, 0x1, 0x1, 0x0, 0x80005, 0xf182, 0x6, 0x0, 0x2, 0x100}) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) r3 = semget$private(0x0, 0x4, 0x4) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000480)=""/208) 03:38:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:06 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x7ffffff9}, 0x0) 03:38:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x1000080, 0x0, 0x0) 03:38:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = semget$private(0x0, 0x7, 0x20) r2 = getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000180)=0xe8) r5 = getgid() semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000440)={{0x21f3, r2, r3, r4, r5, 0x1, 0x1236}, 0x5, 0x400, 0x3ce5bdb4}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c01000100000000003ae0f19d1330303030303030303030303030343039305fac0886c1506b2c2ae93578c6a5592d0e4cd6c36215601ddd0f3688cc5ae6181b2b0c255684b07e443406d8b10000000000000000000000000000000000000000002f67b78668a52d75e351d0548e4f62e6f23e46bf88d670e57e34fd601c6d0756b621a39e23debb76d36230d10cc20e82", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000480)='/dev/media#\x00', 0x1, 0x80000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000780)=0xe8) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x100000, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@allow_other='allow_other'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@permit_directio='permit_directio'}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_type={'obj_type', 0x3d, 'security.ima\x00'}}, {@fowner_gt={'fowner>', r4}}]}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r5, &(0x7f00000040c0), 0x1000) read$FUSE(r5, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r5, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r5, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x8401, 0x0) delete_module(&(0x7f0000000340)='fd', 0x200) accept$ax25(r6, &(0x7f0000000180)={{0x3, @rose}, [@netrom, @rose, @null, @null, @bcast, @null, @bcast, @default]}, &(0x7f0000000280)=0x48) 03:38:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ceph(&(0x7f00000004c0)='ceph\x00', &(0x7f0000000600)='./file0\x00', 0x1, 0x4, &(0x7f0000000a40)=[{&(0x7f0000000640)="3e5231070dc1123d5000675c78229e41da56087521079ac40a64c45054145cb194132f1e1a57d5511c4e48348d507138ac24425d0531a5aa1c4ef8a0013883d995c95f131b588838897708ca3a197bd42ef27cfcc1ada05d30b347541a7e183340f119d27be8aa093a8007edc89d6ffd4d606d90ab278775c873cab3c757af4b5105d1afe705eba3bfb77e037c7ab8e107cf73094156d6d0b3fe9f86cd16ab4b0753d8ec949739639aed4b522dda7cc1c7aad5418122284bc515bfc23db3ba0c3133882bf1da8f78baef9e14218c29d208525cadb15f6226d5e75cb287c1a2604ec2f50cec50f76c", 0xe8, 0x891}, {&(0x7f0000000740)="9368bd7e409857166310db45cc3447e43b3a549d1552b3c65daadcfe07f11b312187d89a0c7db40a79765a623015ee673377b125913fd89dc538ecc4f70c185d27ff07ec52b19c82db342abe0621255312cbf80cabbabf7dc479a60ad8d1a33bf6f1e48b562c08cc914432fb4d6ce15955ce122c4a3dcedbf7cfc44dad5fe3675c87c75e6cc4c9fc0d593d5b9ecfd78db829916fe6b7ed9ff09db812b3a4940c7efa3007d4d28d142e43ebbd33034b60f61a52bcbfbba758cf5724a5fe9aaefdc44d773c3b", 0xc5, 0x5}, {&(0x7f0000000840)="da1afd30706fa3143b9e45b539f4bd8cb1ee94081a1cfe80ce4868989b275703f60c800ce7a90d7ceeb92c2a924c7d19339d9fc0b6ff7f3f5165c16cfa346d4528d036c73bee19951e9c3c50872e6ecadc68b7d9b3bea0662738f9f6b587753f0fd697f86e69bb402c2e589978d1119e3de210662f5ce12a0d5c93e1dff02bfa734a9a20eff52256887e59e60a6e2e3a38964e39f8ed32d01aa389ea2feab51ef21724d54303b3f6c9a72d70280a66d03c28c2eacf76d6acf054a1932c4ce421fe4273138576de9cb0881211319aaaaf934bf419eabe5a371a0206e53ff2d63bec486ef4209953b8405e4a96df695c679261f5c75c", 0xf5, 0x800}, {&(0x7f0000000940)="d63cd93f8cc7d03f352246766e016b91db21f2287a6ac01c972b8a03121069004b6dd802f466b80122e9248dffe69b18a110e4fedcf41628ffe44ca2b7ccb15f6328643bf078ac4b97b8a2ec530dbf270fea07f07a0b09bd1142e1e4b1fb13c5e128d70d9b3f05a49930dfe128980bd7139e111829f4a51fc81e670116b54bff92b4ff8ba505721cacd8960cc1be9a2ecfe6ac94102d89ad7462efe094bdf7e5b4fa6e7f7b8a744d8b4723cd6ae7940be8bd100e48465c1b9ec0747eb2a6e6836c97e52b8ff661809c67ebc8f167cb1810dc2d179f9a138c63314e4d0aed465c58b0d0b99f07e5e3cb06", 0xea, 0xfffffffffffff682}], 0x1000, &(0x7f0000000ac0)='selinux{,\x00') syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000480)='./file0\x00', 0x1, 0x2, &(0x7f00000005c0)=[{&(0x7f00000004c0), 0x0, 0x5}, {&(0x7f0000000500)="a8a4b596e3daf15fc8ff9d3b68c69961921875f9f02334fb4efd3487d7e693d28ff3b8efdeab8842e16ae3ae03944c60ca8e560554aaf0cb9172fa3e72f40a7352016d546d9508b4f6491584a6755bb0d8a05ba3f970cb5eef969b8292ce8266118a23a742ef2acb6210cfa5dd3d4734689121dbe46d579b44dab1fb77c8286a78e8cb5309422bf30daf52", 0x8b, 0x14}], 0x40, 0x0) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x114) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f0000000340)={0xfffffffffffffffc, 0x0, {0x2, 0x9, 0x100e, 0x8, 0x0, 0xffffffffffffffff, 0x2, 0x2}}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x7f, 0x400}, 'port1\x00', 0x4b, 0x0, 0x8, 0x4, 0xfffffffffffff801, 0x80, 0x1ff, 0x0, 0x4, 0x6814}) write$FUSE_POLL(r0, &(0x7f0000000280)={0x18, 0x0, 0x4, {0x7fff}}, 0x18) 03:38:07 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0xffffff1f}, 0x0) 03:38:07 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x2}, 0x0) 03:38:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x20800, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@local, @in=@loopback}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) sendmsg$key(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x2, 0x5, 0x8, 0xe, 0x0, 0x70bd26, 0x25dfdbfc, [@sadb_spirange={0x2, 0x10, 0x4d4, 0x4d3}, @sadb_x_policy={0x8, 0x12, 0x3, 0x5, 0x0, 0x0, 0x5, {0x6, 0x2b, 0x0, 0xc, 0x0, 0x80, 0x0, @in6=@local, @in=@dev={0xac, 0x14, 0x14, 0x13}}}, @sadb_ident={0x2, 0xb, 0x7f, 0x0, 0x81d6}]}, 0x70}}, 0x4001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x10000c0, 0x0, 0x0) 03:38:07 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xab, "3cd5338abde1f1bc6a6280e5cd511d2ff5f72e79d8bdfe86007aa128eeef9b0e6128106a9ed26fca5f6cfbbcd31eaa8cc8e00a1846173b0b5d86bcfd8d60f01295fbcdf6d33466f2360813a704b93e34891aba1d4e22d4eb2793e9ad0aae8b7e3938781d25a1495c5e0f665fe139baa8813eb8b725b81f5436a4d6267725c9a0ed558dd29104eb32ee646737c8e6fa1df89489dde50e78b92ef2c980bba49ff880aa091af35a362ce576bd"}, &(0x7f0000000000)=0xb3) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r1, 0x401, 0x1000}, &(0x7f0000000280)=0xc) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="1dfc7c6f75703d000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r2, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r2, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:07 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x3}, 0x0) [ 647.724961] protocol 88fb is buggy, dev hsr_slave_0 [ 647.730124] protocol 88fb is buggy, dev hsr_slave_1 03:38:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x1) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x1010000, 0x0, 0x0) 03:38:07 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x4}, 0x0) 03:38:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000016c0)=[{&(0x7f0000000140)=""/103, 0x67}, {&(0x7f0000000340)=""/138, 0x8a}, {&(0x7f0000000480)=""/145, 0x91}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/199, 0xc7}, {&(0x7f0000001640)=""/89, 0x59}, {&(0x7f0000000080)=""/38, 0x26}], 0x7, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:07 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x5}, 0x0) 03:38:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x2, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000000140)=@l2={0x1f, 0x6, {0x6, 0x6, 0x0, 0x1, 0x7, 0x2}, 0x0, 0xa77c}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000000480)="bf9ff4fa8623d50562c31239b4c52487d3a79d691b4b701de9050420eb7bacd24ce0279aeaefd05293176b16b55c042568784779c4bf62db0aab9224109db39cb7d7932ca802c818c6519f4b5c05f25bfe3e5878bbf20874f8b6e25b4c1ca24393ff2c301cec66b0906325592e4814b3b2801cc4206e0a4bf794a706b6af185ccaeecd172a78f821a97af691bf5242aba9c47eaad157f7138426c7378f9035e3ecafa733155c749690471ff397f417b4e5aa7bc4aeb51505efc53165c76899fbee5012b853e541e2a1d1965d8ac06c1bd467d27bf7b3a39235c50ed02c5f2d354e2af821", 0xe4}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000000340)="3d546fb307e0018fc64ebb8e30a06eb54d1994cef4f859aad8fe1049e8defdacf800a87f22a6edd577fb73607341b435de6cc265e912aaa27d424944ff71690b3413c2bb6b39a09933167709b8c55a1f3c47fd56dad56ae3bcb70cd26b8972d8237de4899b7c4b2f0e4bea4797398ba1c01b39bb5ddd583594dd490c1badfc49ce69dec8692ad1abd93999b679093e60df23", 0x92}, {&(0x7f0000001580)="92c470a08e3e5a78647d0b9dda763408f0544b9710dad77d20c435a964083bc2d558e8fc863d2f94eb7ad3b284bd9ba7873318a4ff59a33876319fcfa5add4addcd531d89ddd02b8df3f5c35e2701c5a154956a16bf4c22691fd59ae6a3bc995e85a818d981025a63029fab8e568156c1dc2a35bb812f4b13d778f8b682b01ac397439d2a4", 0x85}, {&(0x7f0000001640)="0feefa0403c273c5e7410152e8e7672db4bc1e615723b564402473052d6c121917dd10f78f9e3cc5fe3a88b0f3e8a91ab1d2db9a1807c0b21e6463c31b95db32085b11f1d92ae5f60671015f46cf4ab9787b4acf2ab5cb46135dd61046395f37d6ede890b85b7dd7166020ab0fa8a9e5693086c27a802d8492d031006c7f93cfdc0982fc9740414c523934aa8374fda7a576209442ccca17312687da91cb2b8bfa5df39db43bdbd463e916534722669c497bf8b2bb35ef67574e7c88ecb6d43d2f5f4dfe199b497d6f841e2930f8206c58a3fb20475f697963d3aedc5b", 0xdd}, {&(0x7f0000000280)="d08ff846e3cb905772221684db84cc623c323f57a8b24c07575d06460a6ea58c0aafc750998e87b974e942ddf53bf1471faafea0432d24a7a3e460b23020a670e9261d9adc9666d6f5ca01", 0x4b}, {&(0x7f0000001740)="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", 0xfa}, {&(0x7f0000001840)="cba7f346386d42d587d5a62c4f30765799de39a030ed616480b666cbdc3747ce87a50e243f52fad0785b0b784815ed7fd00dec87d46a9bc2acedf86d061f510332e6d7bd6be5d587cb6e2c0d1895a7ee023e96c0c47ffb045af28fe343ca0969d14b9e6d5aee2a107da045e80acb88f01fdd53a840b43aec1ff5dfe52188b8953dbb011059", 0x85}, {&(0x7f0000001900)="c45243127ba338727b0c24103952fe2cd66a5446af1a4d448d9c4639a7451e56c4e2be0931eb69039435b4720be6fe8bd6b0910a7315768aa821653215fa0af883a2609298805588fc8ae2bd16", 0x4d}, {&(0x7f0000001980)="ee982bf4f150c7ae66bf28a76233d4c3a0f904abb222b8f9edbd74ead57c0ba8980846ebabe8adcff3d7db644c74829c273f7ad9ea0d9fd7e069493f17c86689b95266fe9e7147fb321daa9bdd622db80c33026e22393e8ed8f64b9a2fee1a4a6906e2c5ec3257cb750bfe34a77f683b06da129f11eb7f0434528c47a792026f6362d40303e3967503fc3d5b27711a4955b9b10488b6999c83444e7ad79efe5a1a48b0", 0xa3}], 0xa, &(0x7f0000001b00)=[{0x70, 0x119, 0x0, "6572c714bd35d2d2b704cd732ac67e75aec46e2ab54664780af622b9c5fc461e537ff4aee4c868f7b13ae14462881daab8dbface252e5defb27b0a6d0d9c072bc885c4cca8c2a90b6241ff02eb4c9394a7714f0ba6f4f9b5284dd5ec47"}], 0x70}, 0x2e0}, {{0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000001b80)="bafd3d3ff57c365425981ee3b54b6e1a91ed526665ba7bf8562a222c8b0d5a367e47604eb0b65933a2a7d4a899775e8d13850b4f1d01c3d8d8e1ccaff890e3bd3d356278ee47f1cd508d", 0x4a}, {&(0x7f0000001c00)="3b442e869c6858d96d8748d742465492f436876dffd0bb235f494c66624c900c714bac2799c4b5e9678945098e23347a3a2f533c9d6e4989d59affbb858e3ccf84204192698dccd26f76b526c0f8fd8b38c6485c51773ae5c10a536a351adc87d6049edc8bde0f9c05411cf17c434aee537a498ce37d44f84a79460fd7f2afd2d2c8fcd94e9f50b22e275921e3d9f0b74d0f8f", 0x93}, {&(0x7f0000001cc0)="c1d7f44bbd65a9ee307b3e481d430f5bedb0e058fab562874a2d6b303471e6269ad2de137cd0a5e0fe70ce5c5891f4a4825e4b4018122ec9094db8e0a4cf04f93864f1902c8a609e37a315b57c9cb15d5b58a939fb94354055fd2273e870d19b2a52c1f05b03cdd21c76a7f7a3e6e497964cb1e8ead1fc40f9618c2802a37072e4638205908ec2ee2f0261e70e62d24b443dc08689c7404c5930e352b5f566b08c1c7320dcab082d957b756d4dfe", 0xae}, {&(0x7f0000001d80)="7641e2cd0229a8c87a5d5d168c2d987ce71cd87d98ebad2b5556add24790f8f6a320c7e4650a46065c8c0a572b233271120b68a4f1f47f26e163567687e70bef5f419f32f71360a8486e560d4a53263d4f0d487009098091e7f2bdd9329ffcad1f3c6612d123dfc103324316916dd5d9635fa5c6256aa8ecc2386153ed36e26db8255d072bb46d49f621083d9df37cc22c16273be7385d27f8ff34ea11dda000642d7655f8322247430557b47e88fdf0efff1a88073a2a390b256f49d5b7a54d67653c4e8ce8ef5ceb32f1b2a023238d", 0xd0}, {&(0x7f00000001c0)="0d83f0e0f5", 0x5}, {&(0x7f0000001e80)="baeff5d7d89edf7b5bbab1ef793c5d986655c320fcfa96f429309ce8e6d08e70653a01b6ce8edf4bf9bd78b726255f32aa8360516918680e335bd9d33b03be8ce3b3f48572e96e64b0bfdf40401f8cdd1bd1174b1c55ec6d2d46b19a5277a73932f0efd91cd89b5072321528f96111b79313f53094c4f9415bb886502f2d69afe876d820f8acc5c36e3001060bc9ad3a192aaad9e16e298fd148ec00679708d11fa1707d71dfa5", 0xa7}, {&(0x7f0000001f40)="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", 0x1000}, {&(0x7f0000002f40)="3ed48150c7fe9ac5c0320367e32798a882a21646e2c09be4da5b1dfd6fd31b5ad0a0729735eca9fc8ce14dd2c82441eac789b5e2c18bd1ca4b4be7567a71a24a42b41f486ac1cc0c4f842c8d2f4f6fbe4f4646b520121623af98076acffe83a1fa5aafb7e6b8c95eeb322ee6120e71063cb82daf3ad03b94437cd73614a8879b2c25f3", 0x83}], 0x8, &(0x7f0000003080)=[{0x108, 0x113, 0xfffffffffffff109, "b0cd6e8b2b5837e17efd1e7edd2955361f429bf163634fd81f8431b50567c2e8e1c0e4d144e4102d0b90a70814d4d872a1fc42dba1fda840e01de342311d3519f88d9b1d8556c62721eb53ed2d8799b637810e9c0a10e04bf4690431c9990cededa5be1cb49c06a6c6a243be1a7993a2599033af731b13a18678e1b425a37d26acd0b087594f4ca4d599f5b8dafed824fdda7fab5348247f77afd70c9f1349265a2d780e1de1a0a0bc69f5bafab773a8a183fb5de9e4fea7d35e4cec38f10aeea134c7a13614ec68e30c37c044a5f7f00f25d7f053e6ad69014651386b002d3d76843b70ef5c9b53998b8db64edf5674b4efc6"}, {0x108, 0x10d, 0x7, "a8873821264da589f72d725f4216d240d94532ee4f55701e68709233a91d84b4c23bcd36ac0fb5d021ad367b74bfb77b33b2c11a32935284621c089bd2c0d9835cfc44cf013919c9858f18f501651b1de8f2fe377bd9e26e0d19bc3bb204c855a00946093660f10a1ef0dcbe74cca0a71773f94fa0612b0ae88232931624365dac0a639cc8ad549cb66678a60caf9cfe74993531b23dad81c18224fe4c91c82b05034214fdbf532d9e33573294199587ed059d91fdcef61d63c8a7ed8a090b3cbe1ef6a23963fcd12b4d1ec9798c62d02a0c735bb59fce8c626918544b0aa4e043e7bc3dd3d0c1bccaaf03aad8d561ac090c72c57263"}, {0x90, 0xad, 0x0, "d79438353fc0915f96ac237eea97ab385da7818ce719b2d87c59ff8f91869090208be70e626c94cd0178fc03a7a026af1ceb841c64d913bb53dc1c8d8331beb7ebdf715402cee7c8def33eaf7a4774af82efa583d90007956a819656586b7a538ae5ae04ea650ec645fb3a38d182a57ef640664bd252556e6dc8fb42a5"}, {0x100, 0x117, 0x8, "f9af3d23bd2d4a32847d04990b88f6995fa758c3f0f1cd1ca9b22dbe4d5b33d788a946e9a07ef5b29eba7a960b5b5d3e7f7e4b9c984b5f21f9f28b37bcebaab9696e6e90cdc826b551c04f336c1270ed3eefa4415b408873a8331f2b652728dcae0deeee40c37fde1b0bb918537b1404ef2e7b5ab0e101bf5232cdf3eb714a189d7266d81179c62ff18036bc319caa765d3d7f81cbd7d09d434b48b553884fc7c5e43c0cc652cb3687119b0de652bf7a7a6a7a4354e00c26dd59620858d5c97057a675a71b397f9d0d5f94601b1619ab95e26d341071f0fbe8a415f22962f83407c9c4ac299945bf867935047508"}, {0x40, 0x1, 0xffffffffffffffd8, "ec7501a27302a4e93dbbfa21b458d0f48e6e6209958cf79582fdfc40894776547e3eb2d40e86b154a8bedf0eda"}, {0xd8, 0x10d, 0x3ff, "5c4bb2f61ffff9a7f1da8716794e1a3df3183d4063d31a4893ec63c6d32cebfd8492c62b743119ee89fc8708c9d765e5fc53dd59b521a8d9e55dd8e7e9aa00ad5a7fb76cc883213008796b8119485c22c295f037ce065de4309ce908d512bf8bfc6fe34d37e42694b999b803c7f89426b70ce49b01dd109e01e884dfeab8e01a3046b0a795b2f3c5e56bcea21d6e7e25434fa500e91899a2ccc5368fd29a1ac6c2347493b757324695d321ac75b057b86158ccbca94da36930fd0cdc3b758d07595633"}, {0x60, 0x116, 0xa21b, "f8e33561ccd04a504f155ec7dec176c0ecb8d89f384149903d49d174803645fd4571f00b361bd7583eba69780747aa00295a6265a5c9e5186caf83ae48cefc2dce5775163f5ff3c32cdc85e7"}, {0x40, 0x107, 0x5, "f657171fd4b5cddc292142bf115df9af1e8794857ea2287ebea8ec45ab765ed3d69833b80cbe71544796fbfeac1f66"}, {0xd0, 0x109, 0x1, "5be14f58c7f9e81cec8793c23f812d1bca380a0289a575c726ac29f006e83867124d6c0ea91030c96710acbc99c6ce0971093086b1beaddd38e6e3a60d9df97ff330a6c03b4b6796b73680a86f0d819ed3ad3bc3a8d76802c770cc22d2eed7392c2f9c59ec98eb1f83855ca30159ca1420a8fef0b077e67b6deb3084503a7098d02c050912bb2ed9a2251985b66e546991f96c56e5ffcca265a657f56657ed6a566e356dd8af4c0e01ba37ee7142cbf4d49a6e1ae8dedbce5b213a2ddc27"}, {0x40, 0x129, 0x1f, "d054d17aba4e3b2132bd64b920b560ac635e261d834858d44d2d5c3a689304537c267c87fb1f6b913f"}], 0x668}}, {{&(0x7f0000003700)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80, &(0x7f0000003a00)=[{&(0x7f0000003780)}, {&(0x7f00000037c0)="bffb9c442273108cd47fb25bc0ad3c06c0e2f6ac3b1c782e724f2e760055ebe48c456c028db783f68da24ef956bd46204ec0ded2b3a7e1c72649b9002c032f608f6f2bffad1d207b037fc00c9368fb09f18220e520e93c9002bbca38c4b7f9a5e31dc7317a6a8a9ad4a3637015831b8911c4c73eb1e4765c524a10099e02767dc03ed0151da3b587f30f31f8b3a07c3089dd25b1c3892b95a0c4121b074c1eb845361218821042e0491bddf5ac7c799b21288ec3d4655666733e64", 0xbb}, {&(0x7f0000003880)="31a3391e9de97505918d7c240ac467bdeb4714bd3393ee74627c4ea203f129e1e2a85c6b", 0x24}, {&(0x7f00000038c0)="8ff025869bf4d20c0b9b2727a6e15d84115b241b4ae873d0a22032de60a06634ea7802f2a22ab0362eef575459dfed82516967a4f45367299cd65d487ff353a5eb3affc2f7cdd19e7e1494d1d1f0e361618e1c29", 0x54}, {&(0x7f0000003940)="6bab04dd1b4d6dfd39f143a8db", 0xd}, {&(0x7f0000003980)="99f3abeebb70bf83c7a6063c688b13824b159616d3298c236ec55f03b7aee4ba3facef60b8318ad6da8b9a5401e4501f0adb5224fb1bf54eef6f915494382eb7163bfcf571f0e49151690a4b3f2a90da67c1221a043719e9599bf22d5c119034eef52457e575d36c041bfc6164cf7780f706468dbbca277f", 0x78}], 0x6}, 0xfc6}, {{&(0x7f0000003a80)=@in={0x2, 0x824, @multicast2}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003b00)="8a78ee4105e1f5f9f85880ce4cffcba1fc4c04dbfe2640d2e2434ed690fbc214fc4663ed297f3c85164f", 0x2a}, {&(0x7f0000003b40)="ec9274d92778164df7584309d90783c0d10fa81a0eb40fce21c5a9b4148cfbfd7bcbc84c28f319963a2b8bd1251ba5911bccf05c74a0646d561967085fa05c96260d6b191648", 0x46}, {&(0x7f0000003bc0)="064a2a5270ae6bea58b5e1f7d733dabc1be6d330871b56f9c9d5c83fe6f4d153e524e4102a917ba52533188e5e8127f650dea6dc50fca1e5d9eda8f5d137b89d4e395aba469b8b659cf091af71e50ecb0037244263ca139c251c39d2962cf4e8264955ebe79b0875aca64ed68fb6d005c7408c04129057528308d863eaa89e1de4680debbfc25408447a414ab1b82879619af130f7079b32febfee13a483e1caf31101457639148312e3240c8ee4251903367f5ebdeaf8b98a85e8619dc96168e4348f3a819ac864897ce9deb8059272021dabc7c54e977e05a2978f71305e7024b7d395f63557690a3f1ddb18199f312efd97ddc043", 0xf6}, {&(0x7f0000003cc0)="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", 0xfd}, {&(0x7f0000003dc0)="078b21b6173fdf041141", 0xa}, {&(0x7f0000003e00)="3f8f4cf971d85bf845bc3d55db2f39c6bfcd6b9f9b181adc426ca02a9087dd0299136de454eb432e609d78c4979c6b04602f9f39456ecc1020e255f2dcdf09b5db2f3ef27c36de8ad1c4d4acbdeaae7854", 0x51}, {&(0x7f0000003e80)="ed6ebaf37019fddb1943fcd01fb0b106178f6c906a6880b1b209542f736713f28872f304edc9c6b2f0b39357ed796d1711df5b97da0893fcc49b65f81d645fefc7ca80addc8b11a656c5e5741ad0367e853d8f63c7f88a2e7e657d66ae30ee85bbafb6fabb063db014e792", 0x6b}], 0x7, &(0x7f0000003f80)=[{0xa0, 0x112, 0x9, "4015fc9d29cab96ce4dc4d8d8228e4b93c97245452a7c97a29d13b9d97cea2c28f88744c266597a3bf09b24006646a61868d79c646062f131905dc3143168370ffd0ac0ac915345b0ea1bc602af0cd905cca012b4849557e531dac4f458a4bf156d674819eb60473c51ca19f84554b598dd1c36d6b6ebc145e886b424fe0eccf9c22d6edd85ab3604c"}, {0x80, 0x113, 0x8000, "1a99f96f7cb9ce4f91d07e355b0bff95e9f6e83977ce445f79eb9021b9efb80660848ea50259aacd0e808a151572f5a4848202912e5b06047e66dc4fa6c97de66f3b8689014493618c52e4f4bbfa3d703ff1eeb73bebdcfca67a0c6757df1ba3d7797a84ed49999c88e7c6b2f02fe7"}], 0x120}, 0x2}, {{&(0x7f00000050c0)=@pppoe={0x18, 0x0, {0x0, @dev={[], 0xb}, 'ip6_vti0\x00'}}, 0x80, &(0x7f0000005580)=[{&(0x7f0000005140)="cb6a41287374cf26c98ea7d3d05515a19446980e7e21a991e9a59b2e6461cb54ac031ec4ef6e1c0a4ed0c2c84309154a766febd20f690a7e3f7c37f76da260a8d92eb379c16e927653e100d722cdca70fd1a2a2ed18a443c2ef408a1659fbed005e67872f9ddcb75c84b466121d284ee616639d2cb8cbc45401a7f662d3c90037cb7dbba34128a59fc3aefbb6105125ea41302cd4ad47ca62ee2d73d822c8cbd50e7a59acafd7212798c23005c691ecb4d25e377ff386fb92ccbd82b23c6fd1e1da340db29f444f4b5ac5f686c28f08c1aed2245087d23cc55457d572d16bb875382b6ca02ec78f13762633ad87945471d", 0xf1}, {&(0x7f0000005240)="6191db5d36b62148bd1aebd89505ced5c28d820ffea5357f746c12150b9ca0c0adb10332eec119d55236d27c4fc5351dca2dd7a34df0e34b434cf43d977833c41a6765f5005e05e051841f12e79f3aa43ff346570cc2a51cb1", 0x59}, {&(0x7f00000052c0)="fd2bd67df3eb40cd14eaafa29ab2563ebc2480c2d29193f67c35597303eb2c37974beda78613e3a7a60b61cad121a231f92b7c6d2eda2e78a66a0a4df78a07912ec5003039883036a941c53badb8dc87df43c9074110f11e45b237239710fd502abb5661ae2885de55c96d0fd0f98bf5b8267f97d84b34cdfb3d1de5826083e78e373d3a", 0x84}, {&(0x7f0000005380)}, {&(0x7f00000053c0)="7ddd9dc833f02103e40b7f804b682bcf300d79e605748db4074570044522bf45e2ed50eeec3beca2e31ceb90ece262b51cfe9763e369bf0541545ec3d115718bf81a7330674f", 0x46}, {&(0x7f0000005440)="8e78e99de02f943c253da915ed1f273fafa2b7777040d5d7a9fd337bdbe9d9c7e444e0c313844c56856631fdc081cc9afda7a1165f7ce6e04c49529b05ef3f534af1c3110a5cbbbe80f8b054ea845533fee37c237d9c1863bed5ce3fd93bb510dd16a31d317869d4a5d3e76b18a0e4fd8bd738596ef5de6278ef5833e0c0e23ec29fcbff8317a918e7087728d9", 0x8d}, {&(0x7f0000005500)="9b91864c1f134e539cc256e00336a22e503f799e4d299b2a8fe254e7ed5cf1f94b23949175e77ba44a211264009e6af2724cd5ffaa4d3402dfe3af26d70324d12fdffc27794a030db33a06a4565c324ed242e217bfafe2463f566fb93a60d019e2555a4918ae3be040c59581000d00e06a", 0x71}], 0x7, &(0x7f0000005600)=[{0xa8, 0x0, 0x4555, "0c9bb5f225adec693cf9316970d6f1419c1aa9afd3a30fb022437b993c03332975203dfac9a694139f520a92c650a25d8a29b11405b26554b95c67a7a18f0001fcf5f500cc759110b6ca2ca4b0ba72fd2cba20706d7f63a70ac90cd6516e7a2a447b991d8f7d49252af3f952b8da893c7e1d9065309afa132228dd300b965f31aedf99136ec74cb39a5eb6e5fe21cc442c257cc9556c"}, {0x30, 0x10d, 0x3ff, "45598b66fcb08586e118d85f2825510d37e0f2c89cd428a492c59f9b2bfa7c0c"}], 0xd8}, 0xffffffffffffffff}], 0x5, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x2000000, 0x0, 0x0) 03:38:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x14, "f417"}, 0x4, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x2, 0x0) recvfrom$x25(r1, &(0x7f0000000480)=""/248, 0xf8, 0x2000, &(0x7f0000000180)={0x9, @remote={[], 0x1}}, 0x12) 03:38:08 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x6}, 0x0) 03:38:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x4000000, 0x0, 0x0) 03:38:08 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x7}, 0x0) 03:38:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:08 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x8}, 0x0) 03:38:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x5000000, 0x0, 0x0) 03:38:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = getuid() mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@euid_eq={'euid', 0x3d, r1}}, {@subj_role={'subj_role', 0x3d, 'fd'}}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8c) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:08 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xa}, 0x0) 03:38:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303003e1c256bb6550423030302c757365725f69643d000000000000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000480), 0x523) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000140)=""/64) write$ppp(r1, &(0x7f0000000340)="0f7e683b201f1fb961029fafe6a42c7783bbc99807a401205c3f22a0fdccd98420acedf22f1e78ea99d52594089bcebaccb84ccbef6915b5a42a6045452861da85a5f6b01952bf0a088e1d69e603b05627b37b1f52d831de947d0c4b10e64366be2dcc6f5fe151f4c0eaf5cf2c484463ee493b3a3220afc14fa219e1b82b9625c7c9c92d5f016058815499ae2d313ae41b9e26c5166336607ebf0215426a", 0x9e) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x6000000, 0x0, 0x0) 03:38:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x5000000, 0x0, 0x0) 03:38:08 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xe}, 0x0) 03:38:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x4000000000113, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000380)=""/81) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x1) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0xffffff0f, 0x0, 0x4}, 0x18) [ 649.515169] Unknown ioctl -2146914659 03:38:09 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xf}, 0x0) [ 649.544128] Unknown ioctl -2146914659 03:38:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) chmod(&(0x7f00000000c0)='./file0\x00', 0x40) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f123c12a41d88b070") unshare(0x400) fchmod(r1, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:09 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c500009e", 0x2e}], 0x1}, 0x0) 03:38:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) fcntl$addseals(r0, 0x409, 0x6) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) pipe2(&(0x7f00000001c0), 0x800) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000140), &(0x7f0000000180)=0x4) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x7000000, 0x0, 0x0) 03:38:09 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x10}, 0x0) 03:38:09 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x48}, 0x0) [ 650.053568] validate_nla: 5 callbacks suppressed [ 650.053577] netlink: 'syz-executor3': attribute type 1 has an invalid length. 03:38:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x189000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000140)={0x230, 0x1c, [0x3, 0x5, 0xfff, 0x9af, 0x7, 0x8001, 0xf37]}) 03:38:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x7000080, 0x0, 0x0) 03:38:09 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x4c}, 0x0) 03:38:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @loopback}}, [0x4, 0xb56, 0x7fff, 0x20, 0x6, 0x2b5a, 0x8, 0x401, 0x3, 0x80000000, 0x9, 0x8, 0x7, 0x401, 0x3cdc]}, &(0x7f0000000180)=0x100) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000340)={0x2, 0x4, [0x6000000000000000]}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r1, 0xffffffffffffef41, 0x6, 0x7f, 0x80000000, 0x5}, 0x14) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r2, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r2, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:10 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x60}, 0x0) 03:38:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x8000080, 0x0, 0x0) 03:38:10 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x68}, 0x0) 03:38:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x3, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, '#'}}, {@pcr={'pcr', 0x3d, 0x37}}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) creat(&(0x7f0000000340)='./file0\x00', 0x102) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) write$FUSE_WRITE(r0, &(0x7f0000000300)={0x18, 0xfffffffffffffffe, 0x7, {0x6}}, 0x18) 03:38:10 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x6c}, 0x0) 03:38:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="00000041534d57025551b00d3ed14ee4cf0af56bf498c9f16b4a5d445da2ec4b3bf5e7cf5749df3854027479037ab0db8f266ac1f983c9ca7972eea4d8e401f294610b5341a2ea9583c62a13a08cfbd28072d8c7eb352922bd30052f5e53fd0455f54ba5561fe2f9e443c8df480257c3fefaa20361ba79cbc1b0635a8fa982bfb164a0a09b64d2f616f82a20c0b66b603dfe0f9092", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) tee(r0, r0, 0x3f, 0x6) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x9000000, 0x0, 0x0) 03:38:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:10 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x74}, 0x0) 03:38:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000280)={r2, 0x7}, &(0x7f0000000340)=0x8) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:10 executing program 5: r0 = open(&(0x7f0000000140)='./file0/file0/file0\x00', 0x10000, 0x4) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c20891c8ab1bbf667f797de6e766eb15b59f151dc94f7de018787ea691a980fba1555b8040db98c159f7fb850785967242e68916327abfdd10b75cd2dc2c3aa7c8668452505c92b093d512eca33c8aac09f4630fda247d07cfbf3c8b33e"]) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xa000000, 0x0, 0x0) [ 651.163211] net_ratelimit: 16 callbacks suppressed [ 651.163221] protocol 88fb is buggy, dev hsr_slave_0 [ 651.173363] protocol 88fb is buggy, dev hsr_slave_1 03:38:10 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x7a}, 0x0) 03:38:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f0000000140)="b5945b23bf5a021903fc29e2e8b23e682a7125bf2b528170c2d1c09ab1497f8b8be9c04cba57ff79e84b761c1054bf072ff7cbc7dc5ee95ec2e4f095420556c2a73abb06284d358a67944e690f08ca1aa8a982e0598da9d9803177d1fe30008354bc4b0e9da873dc262ad00485dd9b33e21b832018e0c91a8d92e3862f36fec613fc6ea25249e9b21b4ee84b308d9ba7a89576f818", &(0x7f0000000480)="f8e3cf9b960d216c3f8bf2727e0d121d504cb204310b911018a679ea506af48bec011c5455667ef1f57072694f34eb7f5adedf3af0d1e0b412bd4f9af52b04ec2acdf0fcb107cb913c69cdfd5984e5d18ca693875d0581623266e1d2e9227d5ddca11c5366661e5b8352b8b2fe9cbeec9b64d38a591383a97d84eba403f7ae058d7dffa393c34265d2ec6aa988f5ccf35e67a9a49ca4dde19bc92b633650dac5a4fceb0317e3d532dff7e300f1ff1c1a64f2434492465b4b0e4c91dae82231785247dd51c1d307c5bcac0a3d5a244f593cdbc02053bde26423f48ab0ddf918d3ba6d1590bbf13dd832f1ac161a0e8df967f774a396c97c5efb732e0cbd"}, 0x20) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:10 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xf0}, 0x0) 03:38:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xb000000, 0x0, 0x0) 03:38:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000380)={0x0, 0x8001}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x80000001, 0x82001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r3, 0x100000001000000}}, 0x10) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) [ 651.882901] protocol 88fb is buggy, dev hsr_slave_0 [ 651.888054] protocol 88fb is buggy, dev hsr_slave_1 03:38:11 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x10b}, 0x0) 03:38:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xd000000, 0x0, 0x0) 03:38:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x440441, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) lsetxattr$security_selinux(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x2) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0xffffffffffffff6c, 0x0, 0x4, {0x2}}, 0x18) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f00000003c0)={0x91, 0x2c, &(0x7f0000000340)="2533528d7b7f27db86dcb925a8c8a93ef4dbc5216857fb13934a0661601043a1702490ddf1fdd39fe8b45d2e305d95168b008b2325f817aa5c28b971649d4523be8aca62828ca83595", {0x8, 0x80000000, 0x0, 0x8, 0x734, 0x9, 0x1, 0x7}}) r2 = dup(r0) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x1) 03:38:11 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x300}, 0x0) 03:38:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x14000000, 0x0, 0x0) 03:38:11 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x500}, 0x0) 03:38:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@rc, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000002c0)={r2, 0x1, 0x789}, 0x8) 03:38:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x19000080, 0x0, 0x0) [ 652.362635] protocol 88fb is buggy, dev hsr_slave_0 [ 652.367763] protocol 88fb is buggy, dev hsr_slave_1 [ 652.373015] protocol 88fb is buggy, dev hsr_slave_0 [ 652.378101] protocol 88fb is buggy, dev hsr_slave_1 [ 652.383269] protocol 88fb is buggy, dev hsr_slave_0 [ 652.388322] protocol 88fb is buggy, dev hsr_slave_1 03:38:12 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x600}, 0x0) 03:38:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x1a000080, 0x0, 0x0) 03:38:12 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x700}, 0x0) 03:38:12 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xa00}, 0x0) 03:38:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0xffffffffffffffbd) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x1d000080, 0x0, 0x0) 03:38:12 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xb01}, 0x0) 03:38:12 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xe00}, 0x0) 03:38:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d91106caf51828fec873d0661e7dbb38f627ca683650c149a3b8990b34c1373a4011a82de3b3a0d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001340), 0x1000) r1 = semget$private(0x0, 0x4, 0x334) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000280)=""/85) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:12 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xf00}, 0x0) 03:38:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x20000000, 0x0, 0x0) 03:38:13 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x2000}, 0x0) 03:38:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x24000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000340)={@initdev, 0x0}, &(0x7f0000000380)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x822982f9855ddf55, &(0x7f00000003c0)={@empty, 0x0}, &(0x7f0000000580)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'rose0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000006c0)={@local, @empty, 0x0}, &(0x7f0000000700)=0xc) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000a00)={&(0x7f0000000140), 0xc, &(0x7f00000009c0)={&(0x7f0000000740)={0x254, r2, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0xffff, 0x1f, 0x8, 0x9}]}}}]}}, {{0x8, 0x1, r4}, {0x7c, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x57ff}}}]}}, {{0x8, 0x1, r6}, {0x16c, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xb606}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xa1e628c}}, {0x8, 0x6, r7}}}]}}]}, 0x254}, 0x1, 0x0, 0x0, 0x4040044}, 0x40008c5) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x3f000000, 0x0, 0x0) 03:38:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:13 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x3f00}, 0x0) 03:38:13 executing program 0: socket$alg(0x26, 0x5, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="668bcf28904407c8f4ed82790625643d", @ANYRESHEX=r0, @ANYBLOB="2c006f6f746d6f5301b7a33030303030303030303034303030302c757365725f69643d00000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000003000), 0xfffffffffffffe8d) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x40000000, 0x0, 0x0) 03:38:13 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x4800}, 0x0) 03:38:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000180)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x40000001, 0x0, 0x0) 03:38:13 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x4c00}, 0x0) 03:38:13 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x6000}, 0x0) 03:38:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fO=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c020000000e1ea18bf3", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x107002, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0/file0\x00', 0xaa) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000140)={0x60, 0xfffffffffffffff5, 0x6, {{0x100, 0x3, 0x8, 0x2, 0x77, 0x8001, 0x2, 0x1}}}, 0x60) 03:38:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x50000000, 0x0, 0x0) 03:38:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:14 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643dc6582d131f97853c8c62dc023924184b8a76ab80f47b1465c4dc2643139b23486b7b18145b49d57666aa897f55e1ca81a907699c6d70adb5c4a1000000001bf686c916508758bfb83f974fd7137fe61ac4070c32ca07cd56cc70", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:14 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x6800}, 0x0) 03:38:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x6b6b6b00, 0x0, 0x0) 03:38:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$binfmt_aout(r0, &(0x7f0000000480)={{0x0, 0x632, 0x7ff, 0x6a, 0x8d, 0x8bc3, 0x14a, 0x8000}, "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", [[], [], [], [], [], [], []]}, 0x1720) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:14 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x6c00}, 0x0) 03:38:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x301040, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x90, r2, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2d}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1b, 0x8}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x20}}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x20004000}, 0xc000) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="66643d26ef4aa8d1b4e18f6005c8d50c984ec230e8145772e675dfb6119b451725ba840d98d4afa282881aefb21267a12dcc8b6301509a311a17b53bd8233494b3061744140c7f76d32ac600000000000000066ee9d435cec4ee9c6875a7faeb7d4e33a541ef63903ab8c9777cf9c889d5814cd2573f443a8b0aadbf182d4b8f1594b72fbe2a461e83096b0462687400c8bbb9edd43b8bdeaba22f7ee192356192b55081343f49b2c9", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f6406000000000000000e3030303030303030303030343030303000000000725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x1) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x400000, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000440)=""/217) write$binfmt_misc(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="73797a3168e763b19fbdb03e7b2cef1fbe93ecca55e668119f68bdb98f1ade5c299501f0883cb0d315077e5e338caa617634411972c5a80d5e8a5db828546f2a810ab788ba0f8ea13cd687540ce59646b78f158aa692719e6c1309329b17631b093b5e28921c3e8b2b5cb5145e07a3caa6e698ac7ba1d7ab9d3c028d9cdc30bca90397f9f6c62a32940f4737fc4b23b0e12342a88e6db5a95533e01dd26eb69585b36e4b14f50a11e7f0faf1dc5da6adce8bc37f6a41e20788e4d96e0f7c92ea104506587b8d5c17a711569e405c5e0e36c81d027905851ae6f8d3c7c79036f14f959478191d961c0a75309d880815adca21"], 0xde) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000007c0)={'vcan0\x00', 0x0}) connect$packet(r1, &(0x7f0000000800)={0x11, 0x17, r2, 0x1, 0x7f00, 0x6, @remote}, 0x14) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) flock(r0, 0x1) socket$alg(0x26, 0x5, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x80000007, 0x0, 0x0) 03:38:14 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x7400}, 0x0) 03:38:14 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x7a00}, 0x0) 03:38:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='$group_ie=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x80000008, 0x0, 0x0) 03:38:15 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xf000}, 0x0) 03:38:15 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x34000}, 0x0) 03:38:15 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000180)='./file1\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2001007, 0x0) 03:38:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x80000019, 0x0, 0x0) 03:38:15 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x400300}, 0x0) 03:38:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x84000) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:15 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xf0ffff}, 0x0) 03:38:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x8000001a, 0x0, 0x0) 03:38:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000480)={0x230, r2, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x83}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_LINK={0x148, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb0}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb6cc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1293cdfb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2786}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7522}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'dummy0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3fe91f03}]}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x24}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x45}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x81}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x8001}, 0x4000040) 03:38:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:16 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x1000000}, 0x0) [ 656.520533] net_ratelimit: 14 callbacks suppressed [ 656.520542] protocol 88fb is buggy, dev hsr_slave_0 [ 656.530641] protocol 88fb is buggy, dev hsr_slave_1 [ 656.535798] protocol 88fb is buggy, dev hsr_slave_0 [ 656.540935] protocol 88fb is buggy, dev hsr_slave_1 [ 656.546060] protocol 88fb is buggy, dev hsr_slave_0 [ 656.551172] protocol 88fb is buggy, dev hsr_slave_1 03:38:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffc000/0x4000)=nil) 03:38:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x8000001d, 0x0, 0x0) 03:38:16 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x2000000}, 0x0) 03:38:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:16 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x523, 0x10000) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f6465214b30303459ce3039afd3265f69643d000000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xa847) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000180)={0x10, 0x1c4d, {0x0, 0x9, 0x2, {0x401, 0x20}, {0x7fffffff, 0x2}, @cond=[{0x5, 0x537, 0x4, 0x9, 0x7c, 0x46fb}, {0x81, 0x10001, 0x8a02, 0x9, 0x10001, 0x6}]}, {0x55, 0x7ff, 0x1, {0x4, 0x9}, {0x1, 0x7}, @cond=[{0x1, 0x1, 0x46d, 0x0, 0xfffffffffffffc01, 0xffffffffffffffff}, {0x3fc, 0x8, 0x39, 0xffffffffffffffa6, 0x80000000, 0x9}]}}) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:16 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x3000000}, 0x0) 03:38:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xa0008000, 0x0, 0x0) [ 657.400139] protocol 88fb is buggy, dev hsr_slave_0 [ 657.405336] protocol 88fb is buggy, dev hsr_slave_1 03:38:17 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:17 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x4000000}, 0x0) 03:38:17 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x9, 0x101000) write$FUSE_STATFS(r0, &(0x7f0000000140)={0x60, 0x0, 0x5, {{0xfff, 0x2, 0x0, 0xffffffff, 0x4, 0xfffffffffffffffe, 0x8, 0x3}}}, 0x60) mkdirat(r0, &(0x7f0000000740)='./file1\x00', 0x104) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in=@remote, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@initdev}}, &(0x7f0000000340)=0xe8) mount$9p_tcp(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='9p\x00', 0x800, &(0x7f0000000580)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@cache_loose='cache=loose'}, {@fscache='fscache'}, {@version_9p2000='version=9p2000'}, {@nodevmap='nodevmap'}, {@mmap='mmap'}, {@aname={'aname', 0x3d, '/dev/fuse\x00'}}, {@fscache='fscache'}, {@privport='privport'}, {@uname={'uname', 0x3d, '*.userwlan0]ppp1,vmnet1'}}, {@posixacl='posixacl'}], [{@context={'context', 0x3d, 'staff_u'}}, {@euid_gt={'euid>', r2}}, {@smackfshat={'smackfshat', 0x3d, ','}}]}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xc0000000, 0x0, 0x0) 03:38:17 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000001cc0)=0x1c, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000001d00)=0x4da7, 0x4) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) r2 = syz_open_dev$mice(&(0x7f0000001d40)='/dev/input/mice\x00', 0x0, 0x220002) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000001800)=0xc) sendmsg$netlink(r2, &(0x7f0000001c80)={&(0x7f0000000280)=@kern={0x10, 0x0, 0x0, 0x8020200}, 0xc, &(0x7f0000001c00)=[{&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x136c}, {&(0x7f0000001840)={0x384, 0x2c, 0x200, 0x70bd2d, 0x25dfdbfb, "", [@nested={0x29c, 0x8e, [@typed={0x14, 0x4c, @ipv6=@empty}, @generic="d6a6f1b7d1b79a8b26b220e7eaea6bc94edde74ac38d8f61bcacb03c5d6f04ea3cd502b006424c2246cde772a534720e658ca1aa3dde72473082416a3f2f0b021c122ad5d5aeb0e0247b279c58289a08dcd7d8a554e8b80b2fbac0ff92de4eba2f793ea6d607d3fde8bf3a5a9c40d628ec961a7bc1fc89b4e0db88067228b2349cd36b088102ee24b3c6881d228c7cd8b8cb5627acef57590f09eb92fa", @typed={0x8, 0x16, @u32=0x3ff}, @generic="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", @typed={0x14, 0xc, @ipv6=@local}, @generic="f437fb2f81b23f594ac2c45cddf32a1574ff049c7461813e43ae2833b77b", @typed={0xc, 0x96, @u64=0xfff}, @generic="e6d7a420296329f28e02fcd997056f6b443b98c0600228f417fef71e93e797c1344897607da63a1292533a707cf9ad6e14aa006fbac8c27f132839703521b88ad6e1b227552d15f8d8b070ac476a95400b2e4f46db992ced5295b7f536db8fb955f569adcbd3269a9622520836d58f63ddfa7cdda3b54ed615e745a128a68842401d8c41914a4dcad25ac1ace1e5d1366bd547aecf4dfa404ab9832fe34a14ccf0ab"]}, @generic="10ffa515dfc6f4ff4e82fcc250d3daf49cbe2b40ecef78c207e0faf6a29334f1dc1f0c8a00a4d07e83947a744e7edcbe50670ec0431f48d54e3cf51d239149fc743ce2ffa3a0e4e36552c7a89bd8087ce3832c6761eebcd59de6bdf225693fb6219db5f031", @generic="dd05632351b7ff932cecd398a4caa1e5042fd369c35b75a08f669884adc2052cc05e6a23378396d7fa59ad0114cfd449511fe98eeb74da3df59474d9a5e85ab0f1415d1b210b33d25e5581e3605f6ceca4b58f69546e4d995574e8", @generic="c428", @typed={0x8, 0x5, @uid=r3}, @typed={0xc, 0x1e, @u64=0x3f}]}, 0x384}, {&(0x7f00000050c0)={0x1214, 0x24, 0x0, 0x70bd2b, 0x25dfdbfe, "", [@typed={0xcc, 0x84, @binary="20a422bfcee679d13e8ea6d2ae3cb87030267fbec12dab15997eafa950e91af52d4cbd2186a52c32b0042eec206dc595b378dac408b5c5282f318217f3de646a2f42ea27b139af36d425878858bb9f18f8434ba1b8889d74348cac794e72f1750aa06e9fffb0c1ec87972468c1693260cef04833a61e7c9d04f966ce98440db4f9d9285de18bb52f41345e6fc0abe517163d08d535cc4b2e896c8c88777ae8889b8cb73b246eca886f942735c0413597fc51e484df3af7715c0ffacb0214cf50c14a8be7e4a8"}, @generic="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", @generic="9244dc5d075a1e2eb023f2af6ac686b5d4c38571271e674f3dca410bb79ef9fdb7551899a49ce79bdf59166138b747bfb7b51d057181c355c72ecc79d2f24d4a64e73fc9b48ac8c8c373e1e688801076aca9ee7058bfb845468297f1940599246367f6261968148951e82a7fe110ca3bf6fc1557a69b6fb50c2bd3eb39cfeca48f631cbffd1e40627ec150f2732ee0d4821f249bd773c5", @nested={0x80, 0x3d, [@generic="e14b1b6da0e1d6b74f708e72ef1d6b1504b304c4ba93b350a816e4b6f7341595d0b9559566187eff3403e10a5b2c16e389abd1b4cb1eb8b24070700bc10f09266c645c4521f0ce33f1e5d9a15f669918897679baea991eb65ff73532f1c198f4b87c810e787bfc88393f237a2144bf27553ca0b5c6e6026f7d2077"]}, @nested={0x20, 0x4c, [@typed={0x8, 0x96, @fd=r2}, @typed={0x14, 0x12, @str='security.ima\x00'}]}]}, 0x1214}], 0x3, &(0x7f0000001c40)=[@rights={0x38, 0x1, 0x1, [r0, r2, r0, r0, r2, r0, r2, r0, r2]}], 0x38}, 0x0) sendto$ax25(r2, &(0x7f0000000180)="f10b0b15aaacf265c8b9bfb39f501c621b6b068a2649e2ce69b49ac494adf510f81eac9aa6621a977a8f8d21cdf0abd31b2ccc7348e221bd5b3f51c2bb030bdac1db2206ed49e227aa", 0x49, 0x4, &(0x7f0000000340)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) 03:38:17 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x5000000}, 0x0) 03:38:17 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x6000000}, 0x0) 03:38:17 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) [ 658.119767] protocol 88fb is buggy, dev hsr_slave_0 [ 658.124945] protocol 88fb is buggy, dev hsr_slave_1 03:38:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000180)={0x7, 0x0, 0x1, 0xffffffff}) truncate(&(0x7f0000000280)='./file0/file0\x00', 0x2) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f00000001c0)={0x4e, r2}) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='veno\x00', 0x5) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x70) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="6611b8", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cdfb6f1c19bf60e2fdd90894cdb93c78400"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xc0000001, 0x0, 0x0) 03:38:17 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:17 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x7000000}, 0x0) 03:38:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:18 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:18 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x8000000}, 0x0) 03:38:18 executing program 0: syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x0, 0x2) r0 = syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x3, 0x2) mkdirat(r0, &(0x7f0000000480)='./file0\x00', 0x40) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:18 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xf6ffffff, 0x0, 0x0) 03:38:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x3000040, &(0x7f0000000340)={[{@lowerdir={'lowerdir', 0x3d, './file0/file0'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_off='index=off'}, {@xino_on='xino=on'}, {@workdir={'workdir', 0x3d, './file0'}}, {@xino_off='xino=off'}, {@workdir={'workdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}, {@xino_on='xino=on'}, {@nfs_export_off='nfs_export=off'}], [{@subj_role={'subj_role', 0x3d, '*{\\'}}, {@hash='hash'}, {@permit_directio='permit_directio'}, {@dont_hash='dont_hash'}]}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x8}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:18 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xa000000}, 0x0) 03:38:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) r2 = getgid() fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/status\x00', 0x0, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000580)) getgroups(0x3, &(0x7f0000000500)=[r1, r2, r3]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r4) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) r5 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xbc, 0x204302) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r5, 0xc0505405, &(0x7f0000000180)={{0xffffffffffffffff, 0x3, 0x40, 0x3, 0x8}, 0x0, 0x2, 0x9000000000}) 03:38:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xfcfdffff, 0x0, 0x0) 03:38:19 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:19 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xb010000}, 0x0) [ 659.492207] overlayfs: unrecognized mount option "subj_role=*{\,hash" or missing value 03:38:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xfdfdffff, 0x0, 0x0) 03:38:19 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000002000000000000<0002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:19 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xe000000}, 0x0) 03:38:19 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xff600000, 0x0, 0x0) 03:38:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f6467d300000000000030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) r2 = accept4(r1, &(0x7f0000000140)=@ipx, &(0x7f00000000c0)=0x80, 0x800) setsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f00000001c0)=0x5, 0x4) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000240), &(0x7f0000000280)=0x4) 03:38:19 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xf000000}, 0x0) 03:38:19 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="e8815dbd640b6cff2e9ff8452dafbbada4b0689617ba5b98a06cd1bbb796181c9a3ecd80cbc1aecc5cfb6b491de1593d5bfe8f6d2b5a6808403352599b3fcaf5cf0d5b81c96b4e2461ed7a5650718b7a5f323e18fe41723632cc6d60dc0dbb2fb5d9d7416f57ecb1d6c8ee210d6d883adcd975ce933912277e5866b3b4373f326f82a482b911c410111f30b56c063c"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:19 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x10000000}, 0x0) 03:38:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:19 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xffff8000, 0x0, 0x0) 03:38:19 executing program 5: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x200000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="eb2f369be938d3606b35560ba5b0db3473cbaf9077e5e33822db60"]) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:19 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x20000000}, 0x0) 03:38:20 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:20 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x80000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f00000001c0)=[0x2, 0x800, 0x7fffffff], 0x3, 0x101, 0x3, 0xaa, 0x80, 0x6, {0x3, 0x8, 0x7, 0x3ff, 0xfffffffffffffe00, 0x0, 0x0, 0x73, 0x10000, 0x1, 0x5, 0x7, 0x7, 0x6, "2b2d4d02b3b3f5483893b108f8eb0730c4162b8d35114d59bdedf485d7e32968"}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:20 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x3f000000}, 0x0) 03:38:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66643d0826c8847064c8691220ca8697a2bd4bfdd05ebff37dbe30160d58480851150b31d372d14266683c4ff9a917af16ac75820da03c0b980c1096fe47c339792aa3dfd9719997d844a78076cccceeaa0493829241bdfa8b9767400230fd149d3623c6d25e0f370441fd28a37bb570c44484e943b49c1fc9bb0f76b2dd92", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="bb90994f63c331f31b88a7dad72c67726f75187812f221", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file0/file1\x00', 0x2, 0x40) openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x80001, 0x112) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x10000, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x800, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000340)=[@text64={0x40, &(0x7f0000000280)="420f01dfc4e27d582f0f381ec566baf80cb8bd1c2680ef66bafc0cb000eec481022a03420f01c966ba2000b80cf026d4ef660f38816f2fb805000000b9e55300000f01d9b9d40900000f32", 0x4b}], 0x1, 0x49, &(0x7f0000000380), 0x0) 03:38:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xfffffdfc, 0x0, 0x0) 03:38:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:20 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x48000000}, 0x0) 03:38:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)=0x1) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='$\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:20 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0xbc, 0x400000) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x3f) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="b108e4", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xfffffdfd, 0x0, 0x0) 03:38:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:20 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x4c000000}, 0x0) 03:38:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) fcntl$setpipe(r0, 0x407, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000140)=""/114) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:21 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x60000000}, 0x0) 03:38:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xfffffff6, 0x0, 0x0) 03:38:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2c}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="881567b593061751a269e99ec7e931fffdbe134a5315f6e64b1078e0be8cd3949c5b4c"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) userfaultfd(0x80000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) [ 661.558124] net_ratelimit: 16 callbacks suppressed [ 661.558132] protocol 88fb is buggy, dev hsr_slave_0 [ 661.568521] protocol 88fb is buggy, dev hsr_slave_1 03:38:21 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x68000000}, 0x0) 03:38:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) r1 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000180), &(0x7f00000000c0)=0x60) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000280)={'bridge_slave_0\x00', {0x2, 0x4e21, @broadcast}}) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) fcntl$getflags(r1, 0x409) 03:38:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:21 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x6c000000}, 0x0) 03:38:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="001000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) 03:38:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x4000000000, 0x0, 0x0) 03:38:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:21 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x74000000}, 0x0) 03:38:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0xffff}, &(0x7f0000000180)=0x8) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r2, 0xc0485661, &(0x7f0000000340)={0x0, 0x1, @start={0x7}}) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r1, 0xc7}, 0x8) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dd02e2efdb7b4acac9571d42a180e43028557dd38fd2f7c0bc63ea98b3c5390003d606ba5c38b1cdf8d37f40ee58537138c53bc1a17b278eecf13ac8353e2f2c6586f39f433e50c8b0353c11e6efd1f5e51ad816e9b493654ed86fcc0815cc8536f90", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x8000000000, 0x0, 0x0) [ 662.277696] protocol 88fb is buggy, dev hsr_slave_0 [ 662.282820] protocol 88fb is buggy, dev hsr_slave_1 03:38:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:22 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x7a000000}, 0x0) 03:38:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xc000000000, 0x0, 0x0) 03:38:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) dup2(r0, r0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:22 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x9effffff}, 0x0) [ 662.757437] protocol 88fb is buggy, dev hsr_slave_0 [ 662.762566] protocol 88fb is buggy, dev hsr_slave_1 [ 662.767736] protocol 88fb is buggy, dev hsr_slave_0 [ 662.772821] protocol 88fb is buggy, dev hsr_slave_1 [ 662.778044] protocol 88fb is buggy, dev hsr_slave_0 [ 662.783124] protocol 88fb is buggy, dev hsr_slave_1 03:38:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x400000000000, 0x0, 0x0) 03:38:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="827a5aa900030000678a001000000000000000000000"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x200100, 0x0) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f00000001c0)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:22 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xf0ffffff}, 0x0) 03:38:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f74a108c7626f6cb3f630303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c77d8da6006be6e641f726f75705f6945b9", @ANYRESDEC=0x0, @ANYBLOB="9deb9fc8334f9f87b0ece14708fa4e9f8048ed7dba6ff3af32a8b4f4d26045df34318aeba6dfbc58551378324e9553ab3642fd238abcc3fef1ddb2a8590443ffae04db5060ac719b7ac150e89c3c5080c5e5c4d44bd58a55a90b9a82aec6be493db9cc54be7200"]) r1 = creat(&(0x7f0000000400)='./file1\x00', 0x0) write$nbd(r1, &(0x7f00000006c0)={0x67446698, 0x0, 0x2, 0x2, 0x4, "14355e0e9434f11649c294f16b6228e611a93126db88db19a05d45a167d0ab7e39c213b49ecaf9ae7351543c58439395d1b51d6751f7222fe76577eb1cc95b3476778c1b2a8599f8e6faa8a63546e56d554fd36f0d384956690f18073375aa2eb6c2a58c659f2ce456e4262b96413e51498a1f52cf406e448c7e9bee6e9b74e627da71447b13b7fa3acb903fcf0a0535c3c49524464ea58d6551e66019a190d8b154"}, 0xb2) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)=[&(0x7f0000000180)='/dev/fuse\x00', &(0x7f00000001c0)='em0#-$proc\x00', &(0x7f0000000280)='/dev/fuse\x00', &(0x7f0000000340)='--]$mime_type\x00', &(0x7f0000000380)='security.ima\x00', &(0x7f00000003c0)='fuse\x00', &(0x7f0000000480)='ppp0em1md5sum\x00', &(0x7f00000004c0)='security.ima\x00', &(0x7f0000000500)='security.ima\x00', &(0x7f0000000540)='security.ima\x00'], &(0x7f0000000680)=[&(0x7f0000000600)='fuse\x00', &(0x7f0000000640)='/dev/fuse\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:23 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xfffff000}, 0x0) 03:38:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x60ffffffffff, 0x0, 0x0) 03:38:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x402, 0x4) ioctl$UI_DEV_DESTROY(r1, 0x5502) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0xffffffff, 0x100) 03:38:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:23 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xffffff7f}, 0x0) 03:38:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)=0x0) ptrace$poke(0xffffffffffffffff, r1, &(0x7f0000000680), 0x81) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x404000, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000340)={0x53, 0xfffffffffffffffb, 0xdc, 0x0, @scatter={0x1, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/56, 0x38}]}, &(0x7f0000000480)="fe83d9653c06cff43192a2142e6efa8a787c9d9021c66faaf26f0fac43e58cce7bf2b8835f6da80b9b8ad1aba3858cb8836a6f3a2ed4397b36b582fae31787756411578610ac985d75bb4970fe32c8613039e6a18cbb2084ddcbe809d0313a94b50f179e83955247844571441d26b6bff1d445f1540f2465e2096649cde0b2390e3473f474f42e84f4756e23d2f059714e56d3008eb5939d6be6eaa55a9be0785fd1fadfe43624c35641ea4666908be3997fbb741fd43e0cbeb7281563bb21b13c792283137a3977cab23eab27acd848c958a4b50bb112dfb64255c0", &(0x7f0000000580)=""/219, 0x100000001, 0x10017, 0x0, &(0x7f0000000280)}) 03:38:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x740000000000, 0x0, 0x0) 03:38:23 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xffffff9e}, 0x0) 03:38:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize'}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:24 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xfffffff0}, 0x0) 03:38:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x7f6c1d533000, 0x0, 0x0) 03:38:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x840c0, 0x0) connect$nfc_llcp(r0, &(0x7f0000000280)={0x27, 0x0, 0x2, 0x0, 0x8, 0x6, "e1267816ee6b9a2718b0cb7ccde119af4fb39e17a8d03943d57e6571f4cc6c9910979baabbed90f638b0ba8be7931f45299bdbed1fab67d396d733ef56cca2", 0x14}, 0x60) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x2, 0x0) bind$unix(r1, &(0x7f0000000140)=@file={0x0, './file0/file0\x00'}, 0x6e) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r2, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:24 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x40030000000000}, 0x0) 03:38:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x7fffffffefff, 0x0, 0x0) 03:38:24 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 03:38:24 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x100000000000000}, 0x0) 03:38:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x940000000000, 0x0, 0x0) 03:38:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="acef5f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) read$FUSE(r0, &(0x7f0000000480), 0x1000) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:25 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x200000000000000}, 0x0) 03:38:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x1000000000000, 0x0, 0x0) 03:38:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x2000, 0x0) bind$x25(r1, &(0x7f0000000340)={0x9, @remote={[], 0x0}}, 0x12) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) fstat(r1, &(0x7f0000000180)) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:25 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x300000000000000}, 0x0) 03:38:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x20000000000000, 0x0, 0x0) 03:38:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18, 0x0, 0x4, {0x2}}, 0x18) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, 0x0) lsetxattr$security_ima(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000480)=@v2={0x3, 0x3, 0xb, 0x0, 0xce, "5b3d49fe3f142cae9494a20b88f1a3859dacb45d644375c14e68576d224155227298cc958282327cf19c2faac9a8674a929130b4f459f451fd362d2bacf8e8dff11654578649330b1ee80726ef1833d9064af7abb07a6bfb8528830ba5a57abcc47ad39db184f60b4e1de2779e6d7cc83905979ae066bc5b5b088631f71d5e61ff36e9064556330f98ab25b5a1c8d3bffe9d4d9d8ec1ee53212eceb2a8e8ec8bfa47aa2a0cfda217f7cf76d05b342061866d3858edb46ced8548adbe74584e8fb9cd4e2e0a942a5ac2aecb0f7902"}, 0xd8, 0x3) 03:38:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:25 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x400000000000000}, 0x0) 03:38:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x30531d6c7f0000, 0x0, 0x0) 03:38:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f70303030303030303034103030302c7573657234f2c241897bbf4a280cab64d8163950dda99d32b26f43733a35fe01367f98f4883ee084853c2ba277c51f924c266cc758c6f5e12d74ba99d7fa9f990b335848f24d11c7346f4729c15721383180e392392ae81ac2b1", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0xfffffe23) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000001c0)='keyring!!\x00', 0xffffffffffffffff}, 0x30) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x8000, 0x0) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f00000004c0)=0x40, 0x4) ptrace$getregs(0xe, r1, 0x1f, &(0x7f0000000400)=""/68) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x50002, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r3, 0xc040563d, &(0x7f0000000180)={0x1, 0x0, 0x1, 0x4, {0x1, 0x400, 0x1ff, 0x8}}) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:25 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x500000000000000}, 0x0) 03:38:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x30710000000000, 0x0, 0x0) 03:38:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2ceb"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) ioperm(0x68, 0x9, 0x1) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) r1 = semget$private(0x0, 0x2, 0x0) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000180)=""/69) 03:38:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:25 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x600000000000000}, 0x0) 03:38:26 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x700000000000000}, 0x0) 03:38:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x400, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000280)={0x4, 0x800}) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000180)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000001480)={@nfc={0x27, 0x0, 0x2, 0x2}, {&(0x7f0000000340)=""/133, 0x85}, &(0x7f00000001c0), 0x1}, 0xa0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643d2f0155b21008a750f4331e1b4fa79a9763484b28d973ea95c5b2801e1903a1140a7ca4fa08bfeb617bdaaf99f03ac977e1989c1280d01171b90b27489329b9358fefb7807216b1736dd000b94b4d4c8c6c4a64be30a8b0042fa81b", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x10080, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000140)=[0xfffffffffffffffa, 0x22]) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x6b6b6b00000000, 0x0, 0x0) 03:38:26 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x800000000000000}, 0x0) 03:38:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:26 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x80, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) [ 666.915355] net_ratelimit: 14 callbacks suppressed [ 666.915364] protocol 88fb is buggy, dev hsr_slave_0 [ 666.925483] protocol 88fb is buggy, dev hsr_slave_1 [ 666.930590] protocol 88fb is buggy, dev hsr_slave_0 [ 666.935692] protocol 88fb is buggy, dev hsr_slave_1 [ 666.940851] protocol 88fb is buggy, dev hsr_slave_0 [ 666.945983] protocol 88fb is buggy, dev hsr_slave_1 03:38:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xd4ef556e44985bce}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpgid(0x0) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000140)={0x400, 0xfde, 0x5, 0x3, 0x7fffffff, 0x4}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x9}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:26 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xa00000000000000}, 0x0) 03:38:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x8000a0ffffffff, 0x0, 0x0) [ 667.131364] capability: warning: `syz-executor5' uses deprecated v2 capabilities in a way that may be insecure 03:38:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:26 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xb01000000000000}, 0x0) 03:38:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x1, 0x8, &(0x7f00000016c0)=[{&(0x7f0000000340)="441e3555293bf6981172f066dbfa52bf5763e635fc4c3f96d2730e77a6fd3e0f2c81d0635eae0c7420e349e5c9673d904523a92acd2c5f459bfdc570f176c2359d030ae1eff0dfcc88d838081938c7c870d4b4a4c17bf7d8c7ce608aaa94f3c22e", 0x61, 0x6c8}, {&(0x7f00000001c0)="77bc99cb234b40", 0x7, 0x1}, {&(0x7f0000000480)="a2f192ee8e06a3df38c15f86ec3722204c87ac9b65b17c72bc390b9473986729b8e715a229a5f5af9e2e8569d966dc7f69f13a3891afb85b9d020269b3762d957b1b3dc6ee9f696016077a91d960c6b544867efa78d8f82e68d02658e51a2f135938", 0x62}, {&(0x7f0000000500)="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", 0xfa, 0xcc}, {&(0x7f0000000280)="77668094a198eb9b5d7b2f5078", 0xd, 0x1}, {&(0x7f0000000600)="b164c38abc1d7aa9d6107f698f9845c06dd8bd1d6110a3e0688f4cb165eabb638c770f2201e6fff0543f44caa810b085c71cdf4061bd43d6e57737cae802b48936ec92157e7ff80e989fbaf0d5d5f7a256d91a3f4e00acbcacc8ab2312bd678b7e336cebef0f5856ea3f46bcf0244fa68c9881c01ae7440f36d6d2d9556a1a7fed00320e16d6797955efdd1fae1953bcc4bf32d8c6feaba0f052e6d9427cfd6e33960c251841a5079534", 0xaa, 0x10001}, {&(0x7f00000006c0)="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", 0x1000, 0x84}, {&(0x7f00000003c0)="849a812fdae17f042395148d68276ea84302d5e6aa1510c9b6d7bde5032ab0", 0x1f, 0x6}], 0x2, &(0x7f0000001940)=ANY=[@ANYBLOB="6e6f67727069642c67727069642c626172726965722c636f6e74657874eb77797361646d5f752c61756469742c736d61636b6673666c6f6f723d757365725f69642c7065726d69745f646972656374696f2c7063723d30303030303030303030303030303030010030322c004eb13c697ba278f92ccd08938f15e173b38df16493454c898983f9d34b97cd9db98fa9bb227fcdadb1998e2e3147f24498566caa4c6b87cdde55002e0e4f5e12148474305578593a5052852ecdac5ea561219586b897cb1f89e8cfc7f688d77600278d52c6fb9a6ece9e1862b2d06bf720fa69321d9fb9d1f871b6f4993440131244f423bb9ef1fbb7ca338900c8c85b5094b331f2db8883115abc16893a40e7166c7e4b7631ee11915f73fa34de250da16cb25f58c7350ee96b08772d10d1149a98da34d045512302dd8a046ee1720dec63af5cf0b8e03968cd84105ff0f7d4cf1535416a9b7191baf616016165885b1e9747f1b5a7f301000000f4f2c606cccdaee3e1bd12a24d746850caf7785939867a0be919ef6c8314936e1c7fb45f90047e9c0b47ec2cc198a3"]) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1, 0x100) connect$rds(r1, &(0x7f0000001840)={0x2, 0x4e20, @empty}, 0x10) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000001800)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x2, "1308eecc9886f84df5"}, 0xb, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x80ffff00000000, 0x0, 0x0) 03:38:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f00000000c0)={0x20, 0xfffffffffffffffd, 0x5, {0x8}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:27 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xe00000000000000}, 0x0) [ 667.558854] XFS (loop0): unknown mount option [barrier]. [ 667.705899] XFS (loop0): unknown mount option [barrier]. 03:38:27 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xf00000000000000}, 0x0) 03:38:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xa0500000000000, 0x0, 0x0) 03:38:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 667.794886] protocol 88fb is buggy, dev hsr_slave_0 [ 667.800063] protocol 88fb is buggy, dev hsr_slave_1 03:38:27 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x1000000000000000}, 0x0) 03:38:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xa0700000000000, 0x0, 0x0) 03:38:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:27 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x2000000000000000}, 0x0) 03:38:27 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x3f00000000000000}, 0x0) 03:38:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x401, 0x400000) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x100000000000000, 0x0, 0x0) 03:38:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030d830303030303030303030303030303034303030302c757365725f69643d6033e2b70b31f3b616114a412df74c14f6fc68231225fca8aa9861a988b3a13bfa9428b496b68892c13954793902bb212ed4d9cd01", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7, 0x0, 0x0, 0xfffffffffffffffe}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xb2, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000180)={0x101ff, 0x0, &(0x7f0000ffe000/0x1000)=nil}) 03:38:28 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x4800000000000000}, 0x0) [ 668.514579] protocol 88fb is buggy, dev hsr_slave_0 [ 668.519719] protocol 88fb is buggy, dev hsr_slave_1 03:38:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x100004000000000, 0x0, 0x0) 03:38:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x8000, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f00000001c0)=[{0x9, 0x40, 0x9, 0x2}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001680)='/dev/vhost-vsock\x00', 0x2, 0x0) uname(&(0x7f0000000480)=""/4096) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d537bb18d79bf53c1d80532f6632c88027bb5dd49c71faa9870cdaf42434d28ac83ae744bfc87672061125f5c7ab52497114ef663fba2caaf2383912992a632f6a18f09a93a5b55e13b582f2f7f055566ad65fc8d4238d006f318702243fd3b31692e59f1c7590eae0acb3c229009ca441a3f006c4ef04009ba16601329092fbac3ed3dd4b1bcf125f38d5a0ad40a10b3b407174559ab91895a104582463c45def6a0d2586da97db500ef32aee577728ee981ffb3c8", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) restart_syscall() read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r2, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f00000015c0)="3f5fdf188fdd3d5bfe339522adc64dae4369336641ff58473b2d744f7889e10a649cd5b64584fa9f9306e1b1baed3edb44d17d60098868471393c11d601197a9c15e8e5aec9c0cd57847862f668c8023bebbd50b0d47ccbd68227db6f631940e6543d0577d55a37dfbce0c6f1aad12b05ceb57c061f61438391c18f0c0dc9682d0af062903c41d1542d1cc7abeb7785d75e77cbf4a12dd31608fc611cf9f86ad0d50575d8c4b1612294e52a16ec8db9dcf42e76d5491b4742f9ddf7ac2") ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000400)={0xfd, 0x0, [0xa4, 0x5, 0x8, 0x3]}) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000380)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r2, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x10000000) r3 = memfd_create(&(0x7f0000000080)='ppp0@securityeth1md5sum&{/%vboxnet0wlan1+.eth0[&+\x00', 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x3) 03:38:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:28 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x4c00000000000000}, 0x0) 03:38:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x100008000000000, 0x0, 0x0) 03:38:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) fcntl$setflags(r0, 0x2, 0x1) mount$fuse(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000380)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x1) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0x400000) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000180)={0x6, 0x103, 0x1, {0xf413, 0xfffffffffffffff9, 0x1, 0x5}}) write$P9_RWRITE(r1, &(0x7f0000001a80)={0xb, 0x77, 0x2, 0x3}, 0xb) read$FUSE(r0, &(0x7f00000050c0), 0x1000) lsetxattr$security_selinux(&(0x7f00000019c0)='./file1\x00', &(0x7f0000001a00)='security.selinux\x00', &(0x7f0000001a40)='system_u:object_r:auditd_etc_t:s0\x00', 0x22, 0x1) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) syz_mount_image$jfs(&(0x7f0000000300)='jfs\x00', &(0x7f0000000340)='./file1\x00', 0x100000001, 0x7, &(0x7f00000018c0)=[{&(0x7f0000000500)="f502b273ccc9f7a0311c1ce0e091774e5a23d604ad16086db81b9b7885d33a665954be7a00f04b0fac8c22bae0bfaadd782c5b0f2311af88d598d1b4de964bc4a75a326ec87e1274d0c2abe2a7e2a8ce33a24b0169c3bed7594cf83418aecde9f18a553823e4623b8658a85daaea50cc640e09c7c4964af9bca6a15be334d0b4fcfcc3dbe54f828ae9f0640fdf6f5bff9dc05b7697537dfaa09f5cfcd52a42f165aea42a8b79167aeb35cd621da741994e8d97c56d1b2bf1326f8da5115cfb1fc690b2b2d424e6962b8abe3f2e329e61edc84710ab6068580bc6fccd7ad203904935b8816c2a76fa", 0xe8, 0x7}, {&(0x7f00000003c0)="e0ecdfeaf0c2c04c76a5", 0xa, 0x4}, {&(0x7f0000000600)="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", 0x1000, 0xe7ef}, {&(0x7f0000001600)="bf654b9965cdbb7205e716d1577fe783f13a290294d996b9995ea9b5b2fc815218b4b54cc649d946ca7e080ad5a583e8cb40ebe3a43cb48193dc312d8d193262f6ea794ef1464d94399b48ac42e6e2e9db138a92c68c3c92d41a4d4eca7c1ec81d380b79518e5073127ca4b88e394d453bdaeb50f7f7528796327c7c2008aa337ecd5024ae33437cdb02e39554d79be9b2388bc4", 0x94, 0x2}, {&(0x7f00000016c0)="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", 0xfd, 0x4}, {&(0x7f00000017c0)="9f9335ab9b426b05c55d4717ff2bc0f53e06ade455eb9da7afce76af2fa1ded3eb8165c69ce76125f381e2fe1f3ffd8d639760c89618e5a7d2a86e2e1a69d5d1438f51af0e630d42ed4345fa70a3124ed72fbdc3a026725615c6c39620d08d800042d37787d01894996a15c99b30efef1ea600ae6e94881075534c1c693c256d33d4fdd3b3fd8fc181076c15345c785a22bc7d49db34df1657ba55d14e304adfdc4d27a62208227c59e3739becf0b9aad3bb226c06f8a51e574ba34bfb73e66ee400", 0xc2, 0x8}, {&(0x7f0000000400)="5c9f425016714e68ac65548ba61134e8d6d0e711aac35fa60c499be09a99720c7376c13da2fd9a3da2f37bc3206f19e41014ea5e60ef9a056eeceeee5a6957026a055b001b8ef29db31dc772287ffddae0aa96e17c49891276122636e43c11b92c732e3d69ef230ec66cb5be943ae9bb26fd5f1f27e9310b30e78577c95c", 0x7e, 0x8}], 0x800, &(0x7f0000001980)={[{@umask={'umask'}}, {@nointegrity='nointegrity'}], [{@obj_type={'obj_type', 0x3d, 'eth1cpuset'}}]}) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) getgid() write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x400, 0x0, 0x6}}, 0x20) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000340), &(0x7f0000000380)) r3 = geteuid() mount$9p_xen(&(0x7f00000000c0)='em1\xd3\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x3000020, &(0x7f0000000480)={'trans=xen,', {[{@version_9p2000='version=9p2000'}, {@uname={'uname', 0x3d, 'fd'}}, {@cache_loose='cache=loose'}, {@aname={'aname', 0x3d, 'em1()self'}}, {@dfltgid={'dfltgid', 0x3d, r1}}], [{@euid_gt={'euid>', r2}}, {@audit='audit'}, {@fsname={'fsname', 0x3d, ':@ð1vmnet1([lowlan1*keyring{\''}}, {@dont_appraise='dont_appraise'}, {@fowner_gt={'fowner>', r3}}]}}) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:28 executing program 5: mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000004c0)=[@text32={0x20, &(0x7f0000000400)="b9800000c00f3235010000000f301c000f01cbb9800000c00f3235010000000f300f01c86736f36f0f01df0f2083ea0058000065000fc79b01000000", 0x3c}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r3, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r3, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:28 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x6000000000000000}, 0x0) 03:38:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000000c0)=0x17, 0x4) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x10000c000000000, 0x0, 0x0) 03:38:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:29 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x6800000000000000}, 0x0) 03:38:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000340)="40d14897042328d4f39793a7adee577b175f20be8bf925af0f21ec708eb6cb3aa1594468d04823a7ec61a5c05372240544b37a5a841dbf0ffbe67938858ab6be91c3ab37d3dfe074639ce5cb92002eefaaea42ed77f6240c3f58d8ee0aa11d619064e662253180709470a9f0db512ba6e5507156e56ecb79f7441c57376ea4ab2dfc", 0x82) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x101000000000000, 0x0, 0x0) 03:38:29 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x6c00000000000000}, 0x0) 03:38:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x1c, r2, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:29 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x7400000000000000}, 0x0) 03:38:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x133a) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x200000000000000, 0x0, 0x0) 03:38:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000180)=0xc) r2 = getpgid(0xffffffffffffffff) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000280)={r3, r0, 0x5}) 03:38:29 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x7a00000000000000}, 0x0) 03:38:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:30 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x9effffff00000000}, 0x0) 03:38:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x400000000000000, 0x0, 0x0) 03:38:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:30 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 03:38:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000600), 0x1000) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x420200, 0x20) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000480)) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) write$FUSE_LK(r0, &(0x7f0000000280)={0x28, 0xfffffffffffffffe, 0x5, {{0x6944, 0x2, 0x3, r2}}}, 0x28) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x500000000000000, 0x0, 0x0) 03:38:30 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) 03:38:30 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x1, 0x20002) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffd) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:30 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xffffffff00000000}, 0x0) 03:38:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x600000000000000, 0x0, 0x0) 03:38:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) exit_group(0x3) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:31 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0xfffffffffffff000}, 0x0) 03:38:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000000c0)=0x7ff) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x12c7) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x700000000000000, 0x0, 0x0) 03:38:31 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 03:38:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000180)={0x28, 0x0, 0x3, {{0x80000000, 0x7fff, 0x0, r1}}}, 0x28) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x8000, 0x0) write$9p(r3, &(0x7f0000000540)="64cd3b450da010316fe7f168a5109d9bdabef809c4229433e5fc73f109eabeeccaf059b16b471c262f174a5b60457176c4f264f41c4d4610dc15e0c2915319eb4ebf41d9cfc8f7da9158d8926519af1d38d29b04f6ff2fda7bc6dd8e2a95a8fb6d5444532aea720af9c0725f6f3fac41035bc28756cd4932a4bc3e4bc80945b555df2a704eb0db24da2e570e66dd1a943e5989dd77fcd462fd3d2bf3e739d5da01d08cf36aeb4c8f0e6865d981869d1c98c902c7f3c5e5", 0xb7) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000340)) mknodat(r3, &(0x7f0000000600)='./file0\x00', 0x280, 0x3) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2001}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'veth1\x00'}}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0xc, {0x3}}, 0x18) [ 671.880068] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:31 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x3}, 0x0) [ 671.952836] net_ratelimit: 16 callbacks suppressed [ 671.952845] protocol 88fb is buggy, dev hsr_slave_0 [ 671.957904] protocol 88fb is buggy, dev hsr_slave_1 03:38:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x700008000000000, 0x0, 0x0) [ 671.996613] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 672.025011] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:31 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x4}, 0x0) 03:38:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x800008000000000, 0x0, 0x0) [ 672.165371] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:31 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x5}, 0x0) 03:38:31 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x6}, 0x0) [ 672.289548] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socket$inet_icmp_raw(0x2, 0x3, 0x1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) [ 672.385845] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 672.672484] protocol 88fb is buggy, dev hsr_slave_0 [ 672.677611] protocol 88fb is buggy, dev hsr_slave_1 03:38:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x900000000000000, 0x0, 0x0) 03:38:32 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x7}, 0x0) 03:38:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="c521c57b4c79ae5d534450024d688ee61767d0bff6ca08d85278fba6cbd2b258ed49d441bebf310af272b111570b565d", 0x30, 0x1}], 0x4000, &(0x7f0000000500)={[{@gquota='gquota'}, {@biosize={'biosize', 0x3d, 0xffffffffffffffc1}}, {@gqnoenforce='gqnoenforce'}, {@wsync='wsync'}, {@gquota='gquota'}, {@logbsize={'logbsize', 0x3d, [0x7f, 0x78, 0x77]}}, {@nouuid='nouuid'}, {@logdev={'logdev', 0x3d, './file0'}}, {@nogrpid='nogrpid'}], [{@subj_user={'subj_user', 0x3d, 'fuse\x00'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, r2}}]}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 672.801665] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 672.845872] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:32 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x8}, 0x0) 03:38:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xa00000000000000, 0x0, 0x0) [ 672.990687] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:32 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0xa}, 0x0) 03:38:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xb00000000000000, 0x0, 0x0) [ 673.137055] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 673.152224] protocol 88fb is buggy, dev hsr_slave_0 [ 673.157388] protocol 88fb is buggy, dev hsr_slave_1 [ 673.162570] protocol 88fb is buggy, dev hsr_slave_0 [ 673.167655] protocol 88fb is buggy, dev hsr_slave_1 [ 673.172822] protocol 88fb is buggy, dev hsr_slave_0 [ 673.177901] protocol 88fb is buggy, dev hsr_slave_1 03:38:32 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0xe}, 0x0) 03:38:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xd00000000000000, 0x0, 0x0) 03:38:32 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) connect$bt_rfcomm(r0, &(0x7f0000000280)={0x1f, {0x2, 0x8001, 0x8001, 0x8, 0xbf32, 0x2}, 0x6}, 0xa) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x6}, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000340)=0x4) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001000, 0x0) 03:38:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:33 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0xf}, 0x0) 03:38:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x1400000000000000, 0x0, 0x0) 03:38:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000070c0), 0xffffffffffffff05) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000001c0)={0x18, 0xfffffffffffffffc, 0x4, {0x1}}, 0x18) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x111000, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000180)={0x7, 0x1}) flistxattr(r0, &(0x7f0000000000)=""/63, 0x3f) 03:38:33 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 03:38:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x1900008000000000, 0x0, 0x0) 03:38:33 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x48}, 0x0) 03:38:33 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x4c}, 0x0) 03:38:33 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x60}, 0x0) 03:38:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x1a00008000000000, 0x0, 0x0) 03:38:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="004000708b149ec1459894e388b30fa083c64dfb62eda8648398ee011a1a5b9e1324062ac31ac0859c688e22f527fda5dd62c8555ac42353bf6f5cab33c959fd97697c5f8bf1a5f71d11af55c439b677e9c9dd8a09effd2fc650f249deed8a2368732291197b824e99e7e314cdc13a1fc957e09c6d2ec03f8f6f3187f6795942b5e785899a16b396022e371e59cc", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x9, 0x200000) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f0000000140)=0x3) 03:38:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:34 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x68}, 0x0) 03:38:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x1d00008000000000, 0x0, 0x0) 03:38:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x10000, 0x0) write$P9_RAUTH(r1, &(0x7f0000000180)={0x14, 0x67, 0x2, {0x0, 0x2, 0x4}}, 0x14) write$FUSE_IOCTL(r0, &(0x7f0000000280)={0x20, 0x0, 0x5, {0x4, 0x0, 0x8d}}, 0x20) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000340)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x1) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000140)={0x100000001, 0x6, 0x5, 0x3}, 0x10) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:34 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x6c}, 0x0) 03:38:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0) 03:38:34 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x74}, 0x0) 03:38:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0) 03:38:34 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x7a}, 0x0) 03:38:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:35 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0xf0}, 0x0) 03:38:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x5000000000000000, 0x0, 0x0) 03:38:35 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x10b}, 0x0) 03:38:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0xffffffffffffff57, 0x200000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000180)) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x0, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0) 03:38:35 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x40, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000180)=0x471) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:35 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x300}, 0x0) 03:38:35 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x500}, 0x0) 03:38:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xf6ffffff00000000, 0x0, 0x0) 03:38:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = geteuid() mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x5}}, {@max_read={'max_read', 0x3d, 0x4}}, {@max_read={'max_read', 0x3d, 0x55b9477a}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1e00}}], [{@uid_eq={'uid', 0x3d, r1}}, {@seclabel='seclabel'}, {@audit='audit'}, {@context={'context', 0x3d, 'staff_u'}}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4, {0x80000000}}, 0xfffffffffffffef0) 03:38:35 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x600}, 0x0) 03:38:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xfcfdffff00000000, 0x0, 0x0) 03:38:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x2000, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f00000001c0)={r2, r3/1000+30000}, 0x10) 03:38:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x0, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:36 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x700}, 0x0) 03:38:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x0, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xfdfdffff00000000, 0x0, 0x0) 03:38:36 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000140)={0x2, 0x4, [0x6]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dc5f45c9e649f7b58718f408bb090d86921d0470c22fd595ec5fb840575f3e686197a2f483d75eec54fbeedc2037fc944549d8f4335ae35ffff9f8c583699de6b28d32c74ace219e46401c23df08ee30de47f000000", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:36 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 03:38:36 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/exec\x00', 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000640)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) mount$9p_tcp(&(0x7f0000000380)='127.0.0.1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x11000, &(0x7f0000000940)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@afid={'afid', 0x3d, 0x100}}], [{@smackfsdef={'smackfsdef'}}, {@euid_eq={'euid', 0x3d, r2}}, {@pcr={'pcr', 0x3d, 0x5}}, {@uid_eq={'uid', 0x3d, r3}}, {@euid_eq={'euid', 0x3d, r4}}, {@audit='audit'}, {@permit_directio='permit_directio'}]}}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6664c54fc8e540b344fad18c154fc58cedbf22386a062619ed42ec9b828d", @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030307030303030303034303030302c757365725f69643d7374c5c520b662e111ebaf6aa01db05e637e11615a0f91650db7e4b597b3", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00e5e17c1461d7e3d4ade0bdcd1749a3fde4188af5f962658b45adf4af43fd0144993a6fbce52fd1cb41887408000099219bfbcec6080a21d60b9144a0d01b72fef4d631796865018176824b5edb547ab9c77b7e164f6ac8e67ddf5019135a0c458fad510872582e6e190ad076022fde62"]) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x10000, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r5, 0x10e, 0x3, &(0x7f0000000340)=0x6, 0x4) setsockopt$inet_udp_int(r5, 0x11, 0xa, &(0x7f0000000280)=0x8e, 0x3) read$FUSE(r1, &(0x7f00000040c0), 0x1000) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r5, 0x4008af23, &(0x7f0000000a40)={0x0, 0x2}) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r1, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) mlockall(0x5) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x400, 0x0) write$P9_RSTAT(r6, &(0x7f0000000180)=ANY=[], 0x0) 03:38:36 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0xb01}, 0x0) 03:38:36 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x7fffffff, 0x40100) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) r2 = dup2(r1, r1) ioctl$CAPI_INSTALLED(r2, 0x80024322) 03:38:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xffefffffff7f0000, 0x0, 0x0) 03:38:36 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 03:38:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',root0000000060040000,user_id=\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',grouQ_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000480), 0xfffffd7e) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000340)=ANY=[@ANYRES32=r2, @ANYBLOB="030000000700f77fbd5392d44a3d604a387d71071665561c0e68d44bae1d27044eb8165b2fbdd2375b995e41936e27d2794840764d9011a95bdfe2635b0dbb186e71dbc8e12f95a48aa924a25da1c679dfdb775f3a8553e2cbfeeeed4e30a8745dd4b55970df72c91010d3969cfe091ccbccc1ab92c23da1f7684dd293204696310c517f0e1675bd1b1298483c79192adfdb64470b05403faa4ff1bda9270a7a7a7bfa5b056085aa09"]) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) [ 676.950422] validate_nla: 23 callbacks suppressed [ 676.950432] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x0, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1000, 0x200000) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f0000000480)={'nr0\x00', 0x400, 0xc8b}) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 677.310216] net_ratelimit: 14 callbacks suppressed [ 677.310222] protocol 88fb is buggy, dev hsr_slave_0 [ 677.320467] protocol 88fb is buggy, dev hsr_slave_1 [ 677.325630] protocol 88fb is buggy, dev hsr_slave_0 [ 677.330773] protocol 88fb is buggy, dev hsr_slave_1 [ 677.335936] protocol 88fb is buggy, dev hsr_slave_0 [ 677.341079] protocol 88fb is buggy, dev hsr_slave_1 03:38:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x0, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:37 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0xf00}, 0x0) 03:38:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0) 03:38:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getuid() r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r2, &(0x7f00000008c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000880)={&(0x7f0000000680)={0x1fc, r3, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x28f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xf3a}]}, @TIPC_NLA_BEARER={0xf8, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x1a}, 0x7ff}}, {0x14, 0x2, @in={0x2, 0x4e24, @empty}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x3, @rand_addr="5ca9c686a735fc7f98ee9faa5cb7a803", 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x1c}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x20, @ipv4={[], [], @loopback}}}}}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x203}]}]}, 0x1fc}, 0x1, 0x0, 0x0, 0x800}, 0x40) lsetxattr$security_capability(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='security.capability\x00', &(0x7f00000002c0)=@v3={0x3000000, [{0x2000000000, 0x19c}, {0x1f, 0x3ff}], r1}, 0x18, 0x1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) r4 = accept4(0xffffffffffffff9c, &(0x7f0000000340)=@xdp, &(0x7f00000003c0)=0x80, 0x80800) ioctl$sock_TIOCOUTQ(r4, 0x5411, &(0x7f0000000580)) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xf19, 0x2000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@ipv4, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) r6 = getgid() fchownat(r2, &(0x7f0000000140)='./file0/file0\x00', r5, r6, 0x400) 03:38:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) [ 677.552548] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 677.586591] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:37 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x2000}, 0x0) 03:38:37 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x3f00}, 0x0) [ 677.667375] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xbc, 0x2) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000340)={0x4b7, 0x0, [], {0x0, @reserved}}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xffffffffa0008000, 0x0, 0x0) [ 677.745375] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:37 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x4800}, 0x0) [ 677.857764] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 677.878769] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x0, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0xffffffffff600000, 0x0, 0x0) [ 678.189812] protocol 88fb is buggy, dev hsr_slave_0 [ 678.194937] protocol 88fb is buggy, dev hsr_slave_1 03:38:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:37 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x4c00}, 0x0) 03:38:37 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x108) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66933d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)=0x0) ptrace$cont(0x9, r1, 0x2, 0x85e) read$FUSE(r0, &(0x7f0000002000), 0x1000) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000180)=0x8) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f00000001c0)=0x7e85, &(0x7f0000000280)=0x4) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/sockcreate\x00') ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x2) [ 678.407429] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:38 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 03:38:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) mlockall(0x6) 03:38:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x4) 03:38:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) [ 678.670180] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 678.708332] netlink: 'syz-executor2': attribute type 1 has an invalid length. 03:38:38 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x6800}, 0x0) 03:38:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x5) 03:38:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$binfmt_elf32(r0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x810) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) write$P9_RREADDIR(r1, &(0x7f0000000cc0)={0xc5, 0x29, 0x1, {0x401, [{{0x90, 0x2, 0x3}, 0x4, 0x1, 0x7, './file0'}, {{0x20, 0x3}, 0x8, 0x7, 0x7, './file0'}, {{0x0, 0x0, 0x1}, 0x1, 0x67889ec7, 0x7, './file1'}, {{0x1, 0x4, 0x3}, 0x1, 0xffffffffffffff01, 0x7, './file0'}, {{0x0, 0x0, 0x2}, 0xb09, 0x7, 0x7, './file0'}, {{0x20, 0x1, 0x7}, 0xfffffffffffffffb, 0x9, 0x7, './file0'}]}}, 0xc5) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0xfffffffffffffe54, 0xffffffffffffffff, 0x4}, 0xfffffffffffffc79) 03:38:38 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x6c00}, 0x0) [ 678.909358] protocol 88fb is buggy, dev hsr_slave_0 [ 678.914587] protocol 88fb is buggy, dev hsr_slave_1 03:38:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmkde=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:38 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x7400}, 0x0) 03:38:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x6) 03:38:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:39 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x7a00}, 0x0) 03:38:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fcntl$getownex(r0, 0x10, &(0x7f0000000180)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x6c0000, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000001c0), 0x4) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7) 03:38:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='(\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) times(&(0x7f00000000c0)) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c74dadbe9c917c817ba63d8a911cdd01fbcd5d5a"}, 0x15, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x4}, 0x18) 03:38:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:39 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 03:38:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x9) 03:38:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 03:38:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:39 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x34000}, 0x0) 03:38:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000180)={0x7, 0x0, 0x1, 0xffffffff}) truncate(&(0x7f0000000280)='./file0/file0\x00', 0x2) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f00000001c0)={0x4e, r2}) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='veno\x00', 0x5) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x70) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xa) 03:38:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f00000002c0)={0x6}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x400000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000009c0)={@ipv4={[], [], @empty}, 0x0}, &(0x7f0000000a00)=0x14) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x113, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r4, 0x1}}, 0x18) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f0000000a40)={r3, 0x7, 0x1, 0x7, 0xde01, 0x2, 0x4}) 03:38:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 03:38:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x7f}}, 0x30) 03:38:40 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x400300}, 0x0) 03:38:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xb) 03:38:40 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 03:38:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 03:38:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 03:38:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xd) 03:38:40 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 03:38:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000180)={0x7, 0x0, 0x1, 0xffffffff}) truncate(&(0x7f0000000280)='./file0/file0\x00', 0x2) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f00000001c0)={0x4e, r2}) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='veno\x00', 0x5) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x70) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x5, 0x7f}}, 0x30) 03:38:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x1000000000000000) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',@']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40, 0x0) r4 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x9, 0x404000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={r3, r4, 0xc}, 0x10) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 03:38:41 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) 03:38:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x5, 0x7f}}, 0x30) 03:38:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x14) 03:38:41 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x3000000}, 0x0) 03:38:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x5, 0x7f}}, 0x30) 03:38:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 03:38:41 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) 03:38:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c66736e616d653d656d307365637572697479706f7369785f61636c5f616363657373f02c00"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000180)={0x7, 0x0, 0x1, 0xffffffff}) truncate(&(0x7f0000000280)='./file0/file0\x00', 0x2) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f00000001c0)={0x4e, r2}) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='veno\x00', 0x5) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x70) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) 03:38:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x50) 03:38:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x7f}}, 0x30) 03:38:41 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x5000000}, 0x0) 03:38:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x5, 0x7f}}, 0x30) 03:38:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f00000000c0)={0x20, 0x0, 0x2, {0x7, 0x0, 0xfffffffffffffffc}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) [ 681.994870] kasan: CONFIG_KASAN_INLINE enabled [ 682.004186] validate_nla: 21 callbacks suppressed [ 682.004198] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 682.044129] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 682.087544] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 682.093855] CPU: 1 PID: 29015 Comm: syz-executor4 Not tainted 5.0.0-rc4+ #52 [ 682.100583] kobject: '0:51' (0000000072cfc593): kobject_add_internal: parent: 'bdi', set: 'devices' [ 682.101073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.101192] RIP: 0010:fuse_dev_do_write+0x1e44/0x3780 [ 682.101212] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 d5 18 00 00 49 8b 9f 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 39 [ 682.116322] kobject: '0:51' (0000000072cfc593): kobject_uevent_env [ 682.119752] RSP: 0018:ffff888051c2f6d8 EFLAGS: 00010247 [ 682.119764] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000e6af000 [ 682.119772] RDX: 0000000000000000 RSI: ffffffff828bb69c RDI: 0000000000000004 [ 682.119781] RBP: ffff888051c2faa8 R08: ffff8880567d6340 R09: ffffed1010d0f340 [ 682.119790] R10: ffffed1010d0f33f R11: ffff8880868799fb R12: 0000000000000000 [ 682.119797] R13: 0000000000000000 R14: 0000000000000030 R15: ffff8880868799d8 [ 682.119808] FS: 00007f7374bd9700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 682.119819] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 682.119827] CR2: 000000000073c000 CR3: 000000008a1bf000 CR4: 00000000001426e0 [ 682.119840] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 682.119852] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 682.125237] kobject: '0:51' (0000000072cfc593): fill_kobj_path: path = '/devices/virtual/bdi/0:51' [ 682.143948] Call Trace: [ 682.143982] ? fuse_dev_read+0x250/0x250 [ 682.144001] ? mark_held_locks+0x100/0x100 [ 682.144014] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 682.144098] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 682.144115] ? futex_wait+0x6e6/0xa40 [ 682.168834] kobject: '0:52' (00000000889bb512): kobject_add_internal: parent: 'bdi', set: 'devices' [ 682.170350] ? print_usage_bug+0xd0/0xd0 [ 682.170368] ? futex_wait_setup+0x430/0x430 [ 682.170385] ? add_lock_to_list.isra.0+0x450/0x450 [ 682.178648] kobject: '0:52' (00000000889bb512): kobject_uevent_env [ 682.184953] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 682.184973] ? __lock_acquire+0x572/0x4a30 [ 682.184987] ? __fget+0x472/0x710 [ 682.185007] ? __fget+0x472/0x710 [ 682.197239] kobject: 'loop2' (00000000b785d189): kobject_uevent_env [ 682.200933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.200952] ? lock_downgrade+0x910/0x910 [ 682.200972] ? kasan_check_read+0x11/0x20 [ 682.212420] kobject: 'loop2' (00000000b785d189): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 682.214129] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 682.214146] ? rcu_read_unlock_special+0x380/0x380 [ 682.214165] ? memset+0x32/0x40 [ 682.222745] kobject: '0:52' (00000000889bb512): fill_kobj_path: path = '/devices/virtual/bdi/0:52' [ 682.228721] fuse_dev_write+0x191/0x240 [ 682.228737] ? __fget+0x499/0x710 [ 682.228751] ? fuse_dev_splice_write+0xe10/0xe10 [ 682.228836] ? msdos_partition+0x2610/0x3500 [ 682.228858] ? ___might_sleep+0x1e7/0x310 [ 682.266373] kobject: 'kvm' (00000000afbf847c): kobject_uevent_env 03:38:41 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x6000000}, 0x0) 03:38:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xc0) [ 682.271956] ? __might_fault+0x12b/0x1e0 [ 682.271973] ? arch_local_save_flags+0x50/0x50 [ 682.271990] ? find_held_lock+0x35/0x120 [ 682.276218] kobject: 'kvm' (00000000afbf847c): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 682.280359] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.280451] ? iov_iter_init+0xea/0x220 [ 682.280471] __vfs_write+0x764/0xb40 [ 682.302615] kobject: 'loop1' (00000000a75a13b5): kobject_uevent_env [ 682.304404] ? kernel_read+0x120/0x120 03:38:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x5, 0x7f}}, 0x30) [ 682.307992] kobject: 'loop1' (00000000a75a13b5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 682.314248] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 682.314276] ? rw_verify_area+0x118/0x360 [ 682.314292] vfs_write+0x20c/0x580 [ 682.340907] kobject: 'kvm' (00000000afbf847c): kobject_uevent_env [ 682.342820] ksys_write+0x105/0x260 [ 682.342839] ? __ia32_sys_read+0xb0/0xb0 [ 682.342857] ? trace_hardirqs_off_caller+0x300/0x300 [ 682.342878] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 682.356117] kobject: 'kvm' (00000000afbf847c): fill_kobj_path: path = '/devices/virtual/misc/kvm' 03:38:42 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x0) [ 682.360188] __x64_sys_write+0x73/0xb0 [ 682.360208] do_syscall_64+0x1a3/0x800 [ 682.360224] ? syscall_return_slowpath+0x5f0/0x5f0 [ 682.360239] ? prepare_exit_to_usermode+0x232/0x3b0 [ 682.360261] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 682.382480] kobject: 'kvm' (00000000afbf847c): kobject_uevent_env [ 682.387200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.387212] RIP: 0033:0x458089 [ 682.387227] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 682.387235] RSP: 002b:00007f7374bd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 682.394029] kobject: 'kvm' (00000000afbf847c): kobject_uevent_env [ 682.395881] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458089 [ 682.395890] RDX: 0000000000000030 RSI: 00000000200000c0 RDI: 0000000000000003 [ 682.395899] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 682.395908] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7374bd96d4 [ 682.395927] R13: 00000000004c6f60 R14: 00000000004dc688 R15: 00000000ffffffff [ 682.395942] Modules linked in: [ 682.400207] kobject: 'kvm' (00000000afbf847c): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 682.409291] net_ratelimit: 16 callbacks suppressed [ 682.409298] protocol 88fb is buggy, dev hsr_slave_0 [ 682.425854] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 682.428964] protocol 88fb is buggy, dev hsr_slave_1 [ 682.434084] kobject: 'kvm' (00000000afbf847c): fill_kobj_path: path = '/devices/virtual/misc/kvm' 03:38:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="66ff3d41547ec593e057e00bf4b57e23689fdf3b019dd402e66529c7a1d587f902e130958415697aef2b0d3dc00e417fbc7d9e74752f8c6966865bd832482a9d38d1e719491416456ae4a30530e4a286035ee1568b203b00498007307cef3e14f064839dae6288c7dbe6d936", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f4f643d775a2c0eb9cc242ca8157310d6ecd30f309eb4af8444db37d4c96cb6190d9ccfe47e7dc21bdb7acf307e713105a1b3fb317b8914743e6f89f5553938531375fb62832635deb11f07a15f7ffee287a4312a332e6a339a67", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x6, 0x4) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2001000, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r2, 0xc0285629, &(0x7f0000000180)={0x0, 0x62e85793, 0x4, [], &(0x7f0000000140)=0x3}) [ 682.451258] ---[ end trace 004950233029d4f6 ]--- [ 682.453532] kobject: '0:52' (00000000889bb512): kobject_uevent_env [ 682.456037] RIP: 0010:fuse_dev_do_write+0x1e44/0x3780 [ 682.474666] kobject: '0:52' (00000000889bb512): fill_kobj_path: path = '/devices/virtual/bdi/0:52' [ 682.476216] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 d5 18 00 00 49 8b 9f 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 39 03:38:42 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f201c804a00800000008000afb120001000e00da1b40d805000600c5000000", 0x2e}], 0x1, 0x0, 0x0, 0x8000000}, 0x0) [ 682.492677] kobject: '0:52' (00000000889bb512): kobject_cleanup, parent (null) [ 682.493719] RSP: 0018:ffff888051c2f6d8 EFLAGS: 00010247 [ 682.522540] kobject: 'loop2' (00000000b785d189): kobject_uevent_env [ 682.523536] kobject: '0:50' (00000000d074f8f9): kobject_uevent_env [ 682.526573] kobject: 'loop2' (00000000b785d189): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 682.546020] kobject: '0:50' (00000000d074f8f9): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 682.557766] kobject: 'kvm' (00000000afbf847c): kobject_uevent_env [ 682.560171] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000e6af000 [ 682.568476] kobject: '0:52' (00000000889bb512): calling ktype release [ 682.575522] kobject: 'kvm' (00000000afbf847c): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 682.597257] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 682.603980] kobject: '0:50' (00000000d074f8f9): kobject_cleanup, parent (null) [ 682.608944] RDX: 0000000000000000 RSI: ffffffff828bb69c RDI: 0000000000000004 [ 682.614129] kobject: '0:50' (00000000d074f8f9): calling ktype release 03:38:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000200)={0x20, 0x0, 0x2, {0x7}}, 0x20) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000180)={0x7, 0x0, 0x1, 0xffffffff}) truncate(&(0x7f0000000280)='./file0/file0\x00', 0x2) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f00000001c0)={0x4e, r2}) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='veno\x00', 0x5) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x70) 03:38:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x500) [ 682.622086] kobject: '0:52': free name [ 682.626420] kobject: '0:50': free name [ 682.631319] RBP: ffff888051c2faa8 R08: ffff8880567d6340 R09: ffffed1010d0f340 [ 682.644978] kobject: 'loop3' (00000000ce4720f6): kobject_uevent_env [ 682.683071] R10: ffffed1010d0f33f R11: ffff8880868799fb R12: 0000000000000000 [ 682.713990] kobject: 'loop3' (00000000ce4720f6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 682.744757] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 682.767538] R13: 0000000000000000 R14: 0000000000000030 R15: ffff8880868799d8 [ 682.778519] kobject: '0:50' (00000000e475e2f1): kobject_add_internal: parent: 'bdi', set: 'devices' [ 682.784153] FS: 00007f7374bd9700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 682.795436] kobject: '0:51' (0000000072cfc593): kobject_uevent_env [ 682.798829] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 682.806395] kobject: '0:51' (0000000072cfc593): fill_kobj_path: path = '/devices/virtual/bdi/0:51' [ 682.817144] kobject: 'loop1' (00000000a75a13b5): kobject_uevent_env [ 682.832809] kobject: 'kvm' (00000000afbf847c): kobject_uevent_env [ 682.837174] CR2: 0000001b3132e000 CR3: 000000008a1bf000 CR4: 00000000001426e0 [ 682.846495] kobject: '0:49' (00000000c3b12c49): kobject_uevent_env [ 682.852954] kobject: '0:50' (00000000e475e2f1): kobject_uevent_env [ 682.861302] kobject: '0:51' (0000000072cfc593): kobject_cleanup, parent (null) [ 682.867768] kobject: 'loop1' (00000000a75a13b5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 682.883467] kobject: '0:49' (00000000c3b12c49): fill_kobj_path: path = '/devices/virtual/bdi/0:49' [ 682.891999] kobject: '0:50' (00000000e475e2f1): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 682.902870] kobject: '0:51' (0000000072cfc593): calling ktype release [ 682.909372] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 682.920359] kobject: 'kvm' (00000000afbf847c): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 682.945923] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 682.967397] kobject: '0:49' (00000000c3b12c49): kobject_cleanup, parent (null) [ 682.993928] Kernel panic - not syncing: Fatal exception [ 682.996002] kobject: '0:51': free name [ 683.000316] Kernel Offset: disabled [ 683.007834] Rebooting in 86400 seconds..