fffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:50 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00c5214e0b75ab3e07296b90f1e9a77204c2a924daa0d5e59af19e46942f72662e165f56bf4ba4c704878b24c62609174bb4d5a279cb8d1a091b60e4285df6d321d4e106c9bee5d225eb200b1ee5571675332a9f14ec4dc063485ae39ff24a0ac2657f809ffac604b76cc275196731fcd6fe4899e5e52765875aff5becdfddfb936d49cc2463dfd0aed1b8ffda01e141dc9df3ef05e57e2f8a000000000084000000"]) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f00000018c0)=ANY=[@ANYBLOB="100000000000000000000c009b3c148a00000000fa0ea599f462e70eb5bf61ddcac5d6f2ac38a8dd68a941cec4d35fba54afc6d3a1f5cebfa32cb5cafb5aadf51fcb235af9e31764bcb17d6ae80c723409e09ba7f7782bce768328a2f598e4c8a08ed15bb9b1dd83c0da8085f082ce682e2d7e12eef8d69e1f97728c346c"], 0x10) fsetxattr$security_capability(r1, &(0x7f00000007c0)='security.capability\x00', &(0x7f0000000800)=@v2={0x2000000, [{0x46, 0xfffffffffffffff9}, {0x6, 0x100000001}]}, 0x2, 0x3) fstat(r1, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x6, &(0x7f00000005c0)=[{&(0x7f00000001c0)="ed8d91bd53ed61dab597de17504f27a77f455466091159bb4d32ab32a9c02bf4d2b9820b0ee90fe4fe8b50175131948c10d22be2f7458efbc82030e9a384511b80a9ab4df17c8cf9c1905091", 0x4c}, {&(0x7f0000000280)="a226827265fdfd76650bfc2c097443d6ebb5edb279cf73ba7ab124d34e9a6925eb85533263a425c7b6af9277fb146048ee129f5fedad21a2cb91d3a97bc1a4f24e4445ea1749954850f2ae13b3ce", 0x4e, 0x5}, {&(0x7f0000000340)="e96506ff53df9141f8a47142b9500216172e94ebe1eb1458d06039ab730da3f5889415ab29e77a13094ff7c22d9d44463441683510a4b561f72f31f950eeb4bfcb2e8a1c", 0x44, 0xffffffffffff7fff}, {&(0x7f0000000880)="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", 0x1000, 0x85a0}, {&(0x7f00000003c0)="df412b1d4fc7c7c435134d23672c958502aa6256b918b331f81c283a9b5ca35084c8b6ef19b248fdbc896d1e9cf45e9501e6d0dfc52ac7ded337ee95d7ae23d1c1311582a9452ddd58ee5ecd4b6ec26e002280e2e6a27cad88af253b87276e995c8cfb", 0x63}, {&(0x7f0000000440)="84", 0x1, 0x3f}], 0x1020, &(0x7f0000000700)={[{@umask={'umask', 0x3d, 0x9}}, {@integrity='integrity'}, {@gid={'gid', 0x3d, r2}}, {@noquota='noquota'}, {@discard_size={'discard', 0x3d, 0xaee0}}, {@integrity='integrity'}], [{@subj_role={'subj_role', 0x3d, '9'}}, {@smackfshat={'smackfshat', 0x3d, 'pecurity.'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@measure='measure'}]}) syz_open_dev$admmidi(&(0x7f0000000840)='/dev/admmidi#\x00', 0x7, 0x101000) 12:51:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:50 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = getpgrp(0xffffffffffffffff) r2 = gettid() kcmp(r1, r2, 0x0, r0, r0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xfffffffffffff801, 0x1}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000002c0)={r4, 0x8, 0x10}, &(0x7f0000000300)=0xc) r5 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$KVM_GET_ONE_REG(r5, 0x4010aeab, &(0x7f00000000c0)={0x2bcf, 0xffff}) r6 = memfd_create(&(0x7f0000000000)='md5sum@-\x00', 0x4) ioctl$VIDIOC_SUBSCRIBE_EVENT(r6, 0x4020565a, &(0x7f0000000080)={0x3, 0x980914, 0xfdfc}) 12:51:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:51:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:51:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00_']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$security_smack_transmute(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000004c0)='TRUE', 0x4, 0x1) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xb, 0x240) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0xd8, &(0x7f00000003c0)=[@in6={0xa, 0x4e24, 0x8, @mcast2, 0x7}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e20, 0x101, @dev={0xfe, 0x80, [], 0x16}, 0x7}, @in6={0xa, 0x4e20, 0x5, @local, 0x4}, @in6={0xa, 0x4e22, 0xfffffffffffffffa, @mcast2, 0x8000}, @in6={0xa, 0x4e24, 0x9, @loopback, 0x7fff}, @in6={0xa, 0x4e22, 0x88de, @loopback, 0xfffffffffffffccd}, @in={0x2, 0x4e21, @multicast1}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001880)={r2, 0x1000, "11f5b310b112a2301857b9b2b841bf087a3ccdbf3a5323fdac55d95588fec96446e571c6f797f222b8b67c10a0c3d10e79f1cdbad9acbf9c1834aac12312daf11c5278f6e546924a7cb264469ec2c77c56924a5c4ffe4297ad32f5d6f310c2cad7c55d9a5bf6cf2fe0af036d765d05e3bd1e3bf9afc2a84254e73e5610fa31b9c67b9cc22f35967526520db7975f39e014ffaece9c9a8222433d54b93468fdf8e279eee572f5ba261621e23a459c6c75ff042835fb81b784c711a520ac7f46df4247aa523b35e80a46c3ff4f8caa908daba563a877acb90bf0a08490528e0ef4e97383eb68b5eb3683b64443942ba13f542bdbd201175712ff1adc5c5402429b6a5b12e897f3967d022445bb9fa1e63a6da1d7bc3897a6d0aa9ffb2058a07004a9a2a4c1b56be33ef25b86f4a5bd13faacd25900de0ecf2a11d83998fd2c7f4e07a8c28feaa526eb229384062c274e9f5cd9a1de08a4019af4bfed3ee0827595c140a574481ec9d2488e79d1b153be590c2a4a25ea75c9b4be32114eda7deebc51b55c924380c4c727d228eea9115ee0c802ad5260b4a9f11bff570fdae3b20d22f457d39b98db5c7e7eee7aa2bef663ae49f4dfa3b140fdcbf398b9d03f43e5dc9f2044e2a859bb175185b9b007a7923a80721678535cfffd9fc947f42d53361c0da0701857d4de217f24354f43ed5997a6f94e4aac0ebd6c72a7e18e66176fd3556fcf6d72d883cf96c43f32d80e68f025cb74b98ecdc50bd4fc060426b93ae8d0dd12d7a000513044971170a260b87cc68da472562af7dbbe5b1ac213483fb9f7c9ef66a125a4dd652790a5f3ffe19c35f3a0f3e01a4b6ef83f00bd366c5f940fea53f0aad41af1ae72a67f9f8befd28fffe0c76c1b752821e302d07ab7043f7df042bcdc98816a3a42b212ac8b67ae1e70363f031dddfbd1944c0084027b3341f89298f3ff26a47f45f6d1a16008a06d51a7d1dd2f888f7455e28a6588cd280be44fd573e021adcf610e16d52201041799d0068beaada255a895b3e2c16e0dd743a24b0fc882520b5661a72e0d6736cadb3c0b9b79171b7538599d4c3bcfd3868b6c4405d324df4eaced7efbdc1673fc8b6b5124f6a09575b770bf79b850af9b7707a9a19914880b2489b095b464e04b7955bf90abf0f2b4d4e9a07e964a2bffb2f55a5d8daeae1f01f04664529c6b94caca06bdb324bfbac17c93e88f6a3dae1d8a93895e1d6fb4b4dfa2a371d9006ccc22ea977a7eb9ecceca47efa335927650b54babaa0dd0ae1688bfe47464d7987ecf508c06aa5aa3d340de91fb930f70ad5adc66ef3f707fd8c0744e235e54d52000369a8df3e591bd26794737224945e19ac59aaf77160846063549bf95f87330cec49e279e54be1d3c8c049274b761aadd51ca521180cb4452a712c28a70bb29a457f501e381a91a3145593c2f5c8d9d76d4e7f8f8960af0db1793b0e919c7652f1d85029e1877077d2cc2e0b8b693406d13aadf0df21a2e6778670bf3d121b1f05a06a096b3525218b603ccd07280bc92ac936fcd6f16e9242c8dd82ef0254efca2681bf920550190575dd326f2da64373cdf4182bb83faf455a1507f8f0923d619614f6af26cbab9055bde59aadd7ea3c3ebe9abc350fe3e6da7a720fb201bc20c75a386cc2cc8d89c08242e5ca088e4707530e40f81347934dd7397c80211a03bf7b15d38b08095f7e0aeb86e3f2810ab0bb47ea158373cc6043709b14925a907e010d798fa0a1680ed4efe13e8b5ecaa5d2091d9977030e8176c40922797eae06ea74ee3141845d6aa8ef6cc694dc197561ba563c79fecd2a562dc9dad356f53036f876cebec7a41a060d9f5fd163ba2fda7af6e7a861e534fc4e4d0506346f9fd5882639ab0e2493ad519ca15c4fc002388f2a10ab3f947c36b029b4dbcc82d26aa8a42a8708771685dabb47c919201758dfa47cd43808b337446227d46b55c327fd6f873f3b96d0df2ff1a0610cc78b275d77516f56b4eb9c0bea524323d346fdcdb60983a9ebd04f2d31fad15751f992451a6ce1c0f3defa58fc3276a8fa2239aef9ed0fec762c348b146e58da52a9a142112ec8f223968baae243a6213a8258a6e6b6f237e2c6939ca8001fe7155b1eee086ae83cafbf552259791b70578b1077a35add74fc2e4ab7cb140827450cfae18cebbd58c93fa09e3cbec69845b244a013720ee18330ac7ab227e48fa0a037b8590b2f122c40036584c25cbdbd9c99cfb6e8cb61223e5c37b457b2db5114c0fd84ea7ec57f50cc445d4f3b91cf201070a9cbb3bf95283f3c79039c491af261e40943284881a215276721aabaf180414a6724f4b6f426cec2ada62eb595f3c4072f127db6c207800c421cbf76bd219482829c72fab6f1b8a323f61b6dfd0a33c4cf249bc662c9532e3f86eaab7de3a9244a7a75f746c10159769275ea66fe3a6567298c45368b242d7ba69bca6067904068dcda5957d18c1648ca2dd25ff91d14dbe69ae9026d48935ea9bc30be7f838bb0d4f871fd21f23aec51f76287ba99616fc69260b2c357b737fc2e1be6b012de6c94e51cc6c42b27722f4fd148f10a3eb596f5db41d6b1379f448284fdb1adb137f9bc9721013fe494102127638f95b7593debc9f2a8f2656a3dd660d23b99af3ed66ecc301830291af21b551720da76ad23ba70e9fb5609075c6a818951ead8b2c81adc5287bfb477489554dacbfb48220f86d9ebf0751bd7a3ea9e557b8bfa40ca10925a6f691cad9e6c8f78e5b0bea32ddc1766fda1e257ffc29e4067b2d7ef562d02dcf8941e75f8a01ac2d6b35da12ea27eba7e1573815b0dcbbd9efba9ec9665231605bb25ddeca3635597b51791c8338f44f3ed76689bee01194db6d31e5f8076b9418a7a9e3ff11e3a50b4ade8a2a5ec40e77aee6d530af184c169835e6fa3189cf75e6c2590c680c587f223fd358718b3527f0d7b28408a53a1a7e0e5b7cee891d5635937af2b97d00cafb61c20365c568623896dbf9088b28407491236b2d7e83d50bd8962551b6ddd1d169aec2f280bd0a66ce7d19a51175bd0fde8ac054db186760820fbdc1b31b10a43e3e1ea472c55fd4486d40652f1749bb220ed70b908482829739a7f3ba3167910d4bf9f8ff316b3c65be9302bbf99666a8a66dd614fa62a2af5e438dd90a25bbc2b179eaeb4f2100b3010b3919b04212a8295e5a6a57930c319b010a3cf71a61abc5a4d273aa611fd428d535094ea1a37a414c2fa70fd97016c83f9eb0b5d0285f7ba15f3301c7fba0188db7ef1e3750f286e99ecbd4240f180d34d71efcf26c0bcdab4e9a3c114ca02c16b36e865d86b00d79eeefa3f68c7c7a90a907370c673d770a0d145da78c1f2f3efea075398608b0492238e48b11feb551218434bf5670fb4a775ab4ff498a9b78e3bdb80ab79bb7008f5fc2708289c27a2e352119a9684de77471462be054cb370c9dcdf62424d90890b485c4a8154a80b69e2972bf4e00cb763520abd825749fb51674cc5a7e7438bcfa8334fceb8774e475c8a00038e44e7b75c95af31775075b23f8b8b0e8445f3f13664a69743d5758e6d864c432a196fc1971a951877044e662f4b6be6d4ccfc979693c2bf9baf1cdc4655a8cd65702c29e812efff013f224a42be34f1dc14ccf2fbd42ae5b2a193ae55b541162ddadd446ac2b5d25c8eaefb10db791367120ddaff5ee6e2a6b624b0cead7d7a333456d3d2d7b5d153b5aa23ee3a43d4d357f76a12d04516f1f4021a3acc01710330e0d31b09272e72f65696d9acdf43d6a2cd346d09bc1a29703843c3cdb4a8bf3288bc486b348340dca20694f9f2704e53b7192c87cbf5a4785b40d67c858e6273fcdf916be5a840f530bdfde9d04e2b92e4afa0b2c836f4bc65592e74635094167b87a05ea027a042d855a32d77f8bf8382993dc29dd02d536ba77339cf7ef06e9d104723a92d7b4a287702f9487d309ac27819cf4408a2f63ff18c986c40a6745cffbe5a5a2ea8cbcadc75bcb0232432e17bc0124dd5d33a0cc2ecae7a60196ac371e50bdf6b0666433eb276dfc3bc137182cdab85df826d226e7cb6e6257da4493871014c29700a16c99ae8d5118ef62ed7d179d922655da0b570f0b03b8ee95b3776929a469fdd73040dbfcb29efad2dae255bfab801b0683666007d8c2e8b9c60f581c3ceeb84b710a99c38b5704e1172fbb1230c3c5b7d15775b7dc9f0ff250ce3a549bee9945262a47eed108304a78b18427bd10d530d7409e350dff2c3089fef954b61ee72e830e9d9fe1ec0ad1c67beb8873c4f43263a773db40cd736daa70bfbc7da939e2d3886e58c1d0f7979d56c91b50dd576b40b0e3eee2889e80e2472d741ab529e47a73e4240438422340522fe291295e713175685b03e680bfa3e017f43b52658fc4c4e77bcfea60d5bf9d68ba323308bf4a0c50eca09dd1bd5189d52b3fcd3d0c341b9e8adcaf27a4befdc43c0e7c89ce66d1f43a64a91bb2016fac168da519797f373a5f29c505bdc470ba1885cf8337bc8b94ed5f8f4ccf18860eb2e4736a0bb7911df23d4ae2c568bbfec647a85004585be27066bf9d721f45ab19286b1d67f6b5fbb304121f85947ed38cc4ba2fbae9d2eb5fff05173e7b2844f60fec753f9e710d9272782bff77599abbf74e216b6ac0e9e82bd41596954d2f34bd818f149bb2469be02509e4ff73ec7e17c42eeeef3b51c63ee910c590b414249f5f30634a1f4ee7d19cb6e87aed73b0e4657c7f7762b9192d46a0fb9e463d325c9557e4cb634de7e7fc1faa538009f5f611881f07f761de6ad5d332da31d8fb91e7d68f2f7aa0d7bfaa49f93fed7e16b66f313c24fea2629443f5f69fa3a366279a393695c19cf66da8d7326e02938974c146e5a8491ee060bf713cdb152db0c8eb33b623e3f9902820c764fbf23f6bab0a4691f383ff8049188e764d79d0c15e4849bc9d06e9338855228af037e23d3f7d4629be05c0fe6cf2a8d2fdfda878f5c1925ffbc4cf9dfdf9d7f120d1e7ef762bf2f9a5ff79e6545b31f10fcf76d6a9af999376048375402fb62dc551605ff78238616c116a233aef1859b23ac7886db00a5419372922ce6f33887614dcd134749007a4e9545be6fdcc40e774422acecb94008e15029b06381766778aceb0f651c8ba8b3f3f8eb45a69ca1b123d879e30f35ca7754f22af626d7188a44d29d8e952163f1269825f5e2b2c406c6298cbe053acb00922a69bd7673649cf86348f850b6aacfd1d9fddee677b1286f6cfdbd9510aa990c4eecbc19531da44cf60e4d0ab7ec373cf9a2dfade19eed11e7f39e8177bad910edc2f70bd4c7411b5de3ee816b08d91414edda40723f99c4d70e259f6c560f964e9c471b06c42b7152d4779f94eeb8fb12e2d49c8ef782e83cc63e137aa8bc2f1b73037219aad0e96bd7efab4f2ef5874ea35dda1d672706a88cb14e92e1667c46e365a74acd886c68b439c6bf32704962828e6adaeb0bb0bebbeaab32f79b17bc6d411fd449a81303979f037ffc078fd2d701cceadb4a6be8b318666646dd2da1fb4be3e693d0891544ccc1fe397f83b8e0cc027fd259dc8ec89084c9d358dfa3a1e1646a51ab41d46fe4860cb0e6a2250ed3bd3057c8601e2cae76ad7cefae5049cfc98bbfb1c7bede064f958010a6e2fc49ff37063b33f6147ba5fdbf8634a8f4577f31e066ce8d4ee6a243c794ff4a21f25665cf01777dc79771eac712a88aff6b4d676268d25c231283e9f0e7ed9c5a936ad8c827068de197b301c32e520d94ff4adc4e2b79a2ed7aa"}, &(0x7f0000000200)=0x1008) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) 12:51:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:53 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x5, 0x2080) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f00000001c0)={0x9, 0xffffffffffff92e1, 0x5659, 0x81}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet6_int(r0, 0x29, 0xc9, &(0x7f0000000200)=0x401, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f6465bd30b03030303030303030303030303030301234303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRES64=r1, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) chmod(&(0x7f00000000c0)='./file0\x00', 0x20) fchmod(r1, 0x8ec2a613ff913154) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) dup2(r1, r1) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xf4453b2, 0x2001) 12:51:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(0x0, &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:51:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:51:53 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) getpid() ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:51:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = getgid() mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x40000004000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@smackfshat={'smackfshat'}}]}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="70d2cf75726974792e402424ae2b6d643573756d6370759c960036d317ef251fbc3c6772aa8c7365745d5cdf3493a1f5160e889a5f06c6b4ce39a31a1ed4c0a0cd511b1e9231107c15b0dc184b9ad09fee61e6ed70a3348b6905b4b44217d5469cf6907a865bb02c764b076285e2cbaa8fc9659d5e2f"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x440080, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000140)={'bpq0\x00', 0x1}) 12:51:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000140)) tkill(r3, 0x1000000000016) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:53 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:51:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="70706301aad8fef3ae2c2b2c6457952b2cdfdbde9a4bf4d30000000000000000000000"]) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) fsetxattr$security_selinux(r0, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:fonts_t:s0\x00', 0x1d, 0x3) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) ioctl$int_out(r0, 0x5462, &(0x7f00000000c0)) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:53 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) socketpair(0x0, 0x80000, 0x8001, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x9, 0x3c, 0x3da3, 0x80}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000080)={r2, 0xfffffffffffffffe, 0x30, 0x7, 0x20}, &(0x7f00000002c0)=0x18) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:51:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0xcff, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f00000001c0)='bond_slave_1\x00') mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r2 = semget$private(0x0, 0x3, 0x400) semctl$GETNCNT(r2, 0x5, 0xe, &(0x7f0000000500)) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000280)=0xc) getresgid(&(0x7f00000002c0), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000440)={0xa0, 0x0, 0x7, {{0x0, 0x3, 0x6, 0x7f, 0x9, 0x3, {0x5, 0x8, 0x6, 0x9, 0x100000001, 0x0, 0x4, 0x5000000000000, 0x380000000, 0x7fff, 0x3, r3, r4, 0xffffffff}}}}, 0xa0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1000000000000000040000000000000069c0a4a7ab83a52731f8acd590c478b43e95"], 0x10) 12:51:54 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000040)={0x800100f, 0x980914, 0x1}) 12:51:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:51:54 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00c5214e0b75ab3e07296b90f1e9a77204c2a924daa0d5e59af19e46942f72662e165f56bf4ba4c704878b24c62609174bb4d5a279cb8d1a091b60e4285df6d321d4e106c9bee5d225eb200b1ee5571675332a9f14ec4dc063485ae39ff24a0ac2657f809ffac604b76cc275196731fcd6fe4899e5e52765875aff5becdfddfb936d49cc2463dfd0aed1b8ffda01e141dc9df3ef05e57e2f8a000000000084000000"]) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f00000018c0)=ANY=[@ANYBLOB="100000000000000000000c009b3c148a00000000fa0ea599f462e70eb5bf61ddcac5d6f2ac38a8dd68a941cec4d35fba54afc6d3a1f5cebfa32cb5cafb5aadf51fcb235af9e31764bcb17d6ae80c723409e09ba7f7782bce768328a2f598e4c8a08ed15bb9b1dd83c0da8085f082ce682e2d7e12eef8d69e1f97728c346c"], 0x10) fsetxattr$security_capability(r1, &(0x7f00000007c0)='security.capability\x00', &(0x7f0000000800)=@v2={0x2000000, [{0x46, 0xfffffffffffffff9}, {0x6, 0x100000001}]}, 0x2, 0x3) fstat(r1, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000000, 0x6, &(0x7f00000005c0)=[{&(0x7f00000001c0)="ed8d91bd53ed61dab597de17504f27a77f455466091159bb4d32ab32a9c02bf4d2b9820b0ee90fe4fe8b50175131948c10d22be2f7458efbc82030e9a384511b80a9ab4df17c8cf9c1905091", 0x4c}, {&(0x7f0000000280)="a226827265fdfd76650bfc2c097443d6ebb5edb279cf73ba7ab124d34e9a6925eb85533263a425c7b6af9277fb146048ee129f5fedad21a2cb91d3a97bc1a4f24e4445ea1749954850f2ae13b3ce", 0x4e, 0x5}, {&(0x7f0000000340)="e96506ff53df9141f8a47142b9500216172e94ebe1eb1458d06039ab730da3f5889415ab29e77a13094ff7c22d9d44463441683510a4b561f72f31f950eeb4bfcb2e8a1c", 0x44, 0xffffffffffff7fff}, {&(0x7f0000000880)="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", 0x1000, 0x85a0}, {&(0x7f00000003c0)="df412b1d4fc7c7c435134d23672c958502aa6256b918b331f81c283a9b5ca35084c8b6ef19b248fdbc896d1e9cf45e9501e6d0dfc52ac7ded337ee95d7ae23d1c1311582a9452ddd58ee5ecd4b6ec26e002280e2e6a27cad88af253b87276e995c8cfb", 0x63}, {&(0x7f0000000440)="84", 0x1, 0x3f}], 0x1020, &(0x7f0000000700)={[{@umask={'umask', 0x3d, 0x9}}, {@integrity='integrity'}, {@gid={'gid', 0x3d, r2}}, {@noquota='noquota'}, {@discard_size={'discard', 0x3d, 0xaee0}}, {@integrity='integrity'}], [{@subj_role={'subj_role', 0x3d, '9'}}, {@smackfshat={'smackfshat', 0x3d, 'pecurity.'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@measure='measure'}]}) syz_open_dev$admmidi(&(0x7f0000000840)='/dev/admmidi#\x00', 0x7, 0x101000) 12:51:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x40000, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000200)) read$FUSE(r0, &(0x7f0000000880), 0x4ae) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0xb, 0x0, 0x1}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x5, 0x400000) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000140)={0x0, 0x0, {0x32, 0x20, 0x9, 0x17, 0xb, 0xf83, 0x6, 0xe8, 0x1}}) [ 306.532156] Unknown ioctl 21521 12:51:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x200, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:54 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400000, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000240)={r1, r1}) connect$llc(r1, &(0x7f0000000200)={0x1a, 0x321, 0x5, 0x6, 0x51, 0x20, @remote}, 0x10) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000040)=""/71) 12:51:55 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x8001007, 0x980914, 0x20000000000002}) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000200)=0xffffffff00000000) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) 12:51:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) r2 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r4 = geteuid() stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000140)='\x00', &(0x7f00000001c0)='fuseblk\x00', 0x4000, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xdb}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1c00}}, {@max_read={'max_read', 0x3d, 0x2}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x4}}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@euid_lt={'euid<', r3}}, {@fsname={'fsname', 0x3d, 'pecurity.'}}, {@fowner_lt={'fowner<', r4}}, {@fowner_eq={'fowner', 0x3d, r5}}, {@appraise='appraise'}, {@dont_measure='dont_measure'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000140)) tkill(r3, 0x1000000000016) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 307.269475] Unknown ioctl 21521 12:51:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:51:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, 0x1}, 0x10) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:55 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x161da929, 0xfdfd}) 12:51:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000140)={0x0, 0x1, {0x3a, 0x26, 0x8, 0xc, 0x5, 0x3, 0x3, 0x5b, 0xffffffffffffffff}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) setsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f00000001c0)={@loopback, @rand_addr=0x200, @rand_addr=0x9}, 0xc) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, 0x3}, 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='pecurity.+$$+md5sumcpuset]f\x00']) write$binfmt_misc(r0, &(0x7f00000003c0)={'syz1', "56db91c4c5c74c14087ed4253e3c2c9f6fb0df869811e9fc39f8a5d685fcc8e96f6cea1d1e78bfa2ef531ef7b9419ce51d7a5e6a604f9ecddf919ec6c1656356cb164275c38aafd10796323bb9d67889bb5d5a7987b6b1b42dea9ed49e8bf0fe4c93746f7c84900b12b313a3e2089fcdd49f6ba60a9bf623707526dda995d7013fdf430b43c8786d9106a003df4c6d787c3ad371c3f54243020724806b60f7954e551c9b9c8febb06cf504e3d3656c6de5be053d08708f14084d5d93460877d218b413de79275840378adafd803189be9016c8d4f01862301ac894c2964403ed37459176e86e981c236e258da990c273bf4e"}, 0xf6) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0xfffffe70) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x94000) setitimer(0x2, &(0x7f00000001c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000200)) r1 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x3c, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f00000002c0)) 12:51:56 executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x10080, 0x80) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000140)) tkill(r3, 0x1000000000016) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() chown(&(0x7f00000000c0)='./file0/../file0\x00', r1, r2) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, 0x0, 0x0) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:51:56 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x200000) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$sndseq(r1, &(0x7f0000000240)=[{0x8, 0x35, 0x2, 0x1, @tick=0x5, {0x40}, {0x9, 0x5}, @time=@time={r2, r3+30000000}}, {0xff, 0x100, 0x1, 0x9, @tick=0xfffffffffffffbff, {0x2, 0xbcf}, {0xfff}, @queue={0xf25d, {0x7, 0x80000000}}}, {0x3f, 0x0, 0x1ff, 0x5, @time={r4, r5+10000000}, {0x3f, 0x90}, {0x6, 0x1}, @ext={0x24, &(0x7f0000000200)="51779edec08d977000620deb75d0d93f0258a3b8365f2165d58c7335ec3895a3ae315f5c"}}], 0x90) 12:51:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x800, 0x4, 0xdcf, 0x6, 0x3, 0x3e, 0x10000, 0x23, 0x40, 0xd8, 0x7afb, 0xffffffffffffff7f, 0x38, 0x1, 0x4, 0x80000000}, [{0x70000007, 0xad, 0x0, 0x7, 0x8, 0x0, 0x2, 0xf95}, {0x70000006, 0x10000, 0x4, 0xffffffffffffffc0, 0x7534, 0x2, 0x4, 0xc}], "30ad625782db3c0a36906acd1016be6f9d681096a46d5758b268582428088c05f0fbb5cc94f1ee014cbdf44591c2b20157a8087b90968c053f49b2c5b70138fb3ab3b57c8e908fcac8d0d77f6ba18e9c6dde5a2463e671a45b"}, 0x109) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:51:56 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000080)={0x80, 0x10, [0x7, 0x5, 0x5, 0x800]}) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:51:57 executing program 0: socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000000c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x0, 0x200000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) r3 = getegid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="b8000000f5ffffff060000000000000004000000000000000100000000000000ff0700000000000008000000000000edfe010000feffffff010000000000000007000000000000000300000000000000e88057a1000000000800000000000000010400000000000008000000000800000600000007000000000100005b2aadafcee90f29ddf0e52ec3a663a885577f64e5a5a96817f08f122923607c77b900404023901c8e779ad51285cefd583c9ec4bbc4002b5c5822e9b181e57dc2882348e4adda72aaa6031f0ba332cfd9c9c537e6f3a08a936518d3488ba67d840e6f209281edf5bc2ba55ea32cada9d87a", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0800000005090000000000000300000000000000f0d3000000000000090000000080000070656375726974792e00000000000000"], 0xb8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x1, {0xa, 0x4e23, 0x8, @mcast1, 0x1}, r4}}, 0x38) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000140)) tkill(r3, 0x1000000000016) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:51:57 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6ac904d3, 0x240) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) ioctl$UI_DEV_CREATE(r0, 0x5501) 12:51:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) mount(&(0x7f00000001c0)=@sr0='/dev/sr0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='efivarfs\x00', 0x0, &(0x7f00000002c0)='\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='syscall\x00') ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x9, 0x100000001, 0x100, 0x5, 0xfb84, 0x7fff}) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x120) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = semget$private(0x0, 0x0, 0x20) semctl$GETNCNT(r1, 0x6, 0xe, &(0x7f00000003c0)=""/254) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:57 executing program 1: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080), 0x4) write$binfmt_aout(r0, &(0x7f00000002c0)={{0x107, 0x80, 0x100000000, 0x31e, 0x338, 0x2, 0x3b9, 0x9}, "d2b3e69799d3aa39fed7b1d9d903b9494d0269d70cc65e0aa1b5bfc3823b34e616c0dd1454d46a5171e5bb07834d971fc09916bf2f8a5d0eef8414a2bd6307d9ba6aeccdbe1c7538938457b315124a1c832fed5037ec380358063ee441020be5b6c24e1221f07f8970fcee765d74e25d0d940a4dc1c8e21c7e57042c7d3db461b66f4cb8cd981dbd6ba042d381beed36bfe392e9a2d80d7e71f2fb73a721aaea4abca73d6e24f81a63dbffb4fc35de5dcd4ce846992a4927d61f0cf072", [[], [], [], [], [], [], []]}, 0x7dd) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000140)={0x0, @data}) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000200)={{0x1f, 0x1}, 'port1\x00', 0x4, 0x8, 0x5, 0x80, 0x800, 0xfffffffffffffff8, 0xff, 0x0, 0x2, 0x8}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xffff) 12:51:57 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet(0x2, 0x1, 0x7) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000000)=0xffffffff, 0x4) r3 = gettid() ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000040)=r3) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000200)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 12:51:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f0000000880), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:58 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x833, 0x40) r2 = open(&(0x7f0000000040)='./file0\x00', 0x400, 0xa) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000080)={0x0, r2}) 12:51:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000140)) tkill(r3, 0x1000000000016) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:51:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:58 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x7c6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="07ac71e2d32335d4b568b9", 0xb}], 0x40000, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x3}}, {@hash_rupasov='hash=rupasov'}, {@balloc_notest4='block-allocator=notest4'}, {@barrier_none='barrier=none'}, {@data_writeback='data=writeback'}, {@user_xattr='user_xattr'}, {@usrjquota_file='usrjquota=syz'}], [{@dont_appraise='dont_appraise'}]}) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000300)=@hci, &(0x7f0000000380)=0x80, 0x80000) r2 = syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x81, 0x10000) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) getsockopt$inet6_buf(r1, 0x29, 0x36, &(0x7f00000003c0)=""/224, &(0x7f00000004c0)=0xe0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000500)={0x3, 0x0, 0x1000, 'queue1\x00', 0x1}) socket$rds(0x15, 0x5, 0x0) 12:51:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:51:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="70656375726974792e2b24242b6d643513756d6370757765745d2600"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x10) 12:51:58 executing program 1: ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, &(0x7f0000000140)={0x0, @data}) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000000c0)={0x3, 0x0, 0xfdfd}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x105002, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 12:51:58 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000040), 0x4) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:51:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() write$FUSE_DIRENTPLUS(r0, &(0x7f00000003c0)={0x2a8, 0x0, 0x4, [{{0x2, 0x2, 0x949, 0x10000, 0x0, 0x81, {0x1, 0x81, 0x38c, 0x2, 0x7f, 0x1, 0x4, 0x6, 0x10000, 0x9fd3, 0x3, r1, r3, 0x4, 0x4}}, {0x2, 0x4, 0x13, 0x2, '+$$+md5sumcpuset]&\x00'}}, {{0x6, 0x1, 0x2, 0x0, 0x3, 0x7, {0x1, 0x100, 0x1, 0x8, 0x1, 0x58, 0x7, 0xf4, 0x86, 0xfff, 0x9, r1, r2, 0x400, 0x80000000}}, {0x1, 0x9, 0x1, 0x7, '&'}}, {{0x1, 0x3, 0x100000000, 0x8000, 0x9, 0x1, {0x2, 0x800, 0x1, 0x38b4, 0xf69, 0xc35, 0x6, 0xb4, 0x8, 0x3, 0x5, r1, r2, 0x7, 0x1}}, {0x5, 0x6, 0x5, 0x5, 'fuse\x00'}}, {{0x4, 0x3, 0xfffffffffffffff9, 0x800, 0x10000, 0x100, {0x3, 0xb538, 0x2, 0x5, 0xea0, 0x1, 0x0, 0x10001, 0x7f, 0x80000001, 0x0, r1, r3, 0x1d, 0x8}}, {0x1, 0x80, 0x10, 0xfff, "836b657972696e672973656c665b2f2d"}}]}, 0x2a8) 12:51:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000001c0)=0xc) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f00000000c0)='./file0\x00', r1, r2) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="100000000700000000007f69a025cc99"], 0x10) 12:51:58 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x602, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000480)={r4, 0xfffffffffffffffe}, 0x8) iopl(0x2) timerfd_settime(r1, 0x1, &(0x7f0000000380)={{0x0, 0x1c9c380}, {r2, r3+30000000}}, &(0x7f00000003c0)) clock_gettime(0x4, &(0x7f0000000540)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x9, 0xfffffffffffffffe, 0xc5, 0x5, 0x7fffffff, 0x1, 0x7d, 0xffffffffffff6de4}, &(0x7f0000000040)={0x2, 0x2, 0xe7, 0x4, 0x2, 0x1, 0x4, 0x8}, &(0x7f0000000080)={0x80, 0x7, 0xff, 0x1, 0x858, 0x6, 0x1, 0x6}, &(0x7f0000000240)={r5, r6+30000000}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:51:58 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001240)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote, 0x0, 0xff}, 0x0, @in=@multicast2}}, 0xe8) r3 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f00000000c0), 0x4) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)={0x6, 0x1}) 12:51:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x818000, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize'}}, {@max_read={'max_read', 0x3d, 0x222}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@euid_eq={'euid', 0x3d, r3}}, {@obj_role={'obj_role', 0x3d, 'posix_acl_accessem1^trusted'}}, {@obj_user={'obj_user', 0x3d, 'pecurity.'}}, {@subj_user={'subj_user', 0x3d, '+$$+md5sumcpuset]&\x00'}}]}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18, 0x0, 0x5, {0x9}}, 0x18) 12:51:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000140)) tkill(r3, 0x1000000000016) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) 12:51:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:58 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) getegid() ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000040)={0x800100f, 0x1, 0x1}) 12:51:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:51:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) socket$inet(0x2, 0x80000, 0x7) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x6, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:51:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000140)) tkill(r3, 0x1000000000016) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:51:59 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x2, 0x980914, 0xfdfd}) 12:51:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x44000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000200)={0xcfe8, 0x8, [0x8, 0x4bc]}) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000003c0)=""/164) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x80201, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000140)="5ed6e862a009b27182c7c80215da5405", 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r4 = fcntl$getown(r0, 0x9) write$FUSE_LK(r0, &(0x7f0000000280)={0x28, 0xfffffffffffffffe, 0x6, {{0xba, 0x9, 0x2, r4}}}, 0x28) 12:52:01 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) socketpair$inet(0x2, 0x0, 0x1000, &(0x7f0000000200)) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000000)={0x5, 0x33, 0x2}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xde7, 0x200000) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000080)=0x6, 0x4) 12:52:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000140)) tkill(r3, 0x1000000000016) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) accept(r1, 0x0, &(0x7f0000000080)) 12:52:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="bc309b0e0b150f2e61e195157777a55d65d96455424dc3705e00d837c8eabe16e84e43ca1781d9e53aeb77bc377e1f8ccb7aca96f421cd123ed70aa4bce97f4c04e7ef9e8aac93277cded2fe6dbc0841845eebd9ba08699e8f157fb7f6f5c3008d00e1d6aaea9b894a10be216148c421164bed7cdf2454e1c2d93dbef0c46345f1636b9e0465e17fd40acaa4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6788705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) socketpair(0x4, 0x80003, 0x6, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x8}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000200)={r2, 0x24, 0x2, [0x3, 0x33f8]}, &(0x7f0000000280)=0xc) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:01 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x7f, 0x4, 0x7, 0xffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x10040, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="03005247000000000000"], &(0x7f0000000380)=0xa) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) r2 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e21, 0x8000, @mcast1}}}, &(0x7f0000000080)=0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000002c0)={0x1, 0x81, 0x3, 0x1, 0x1, 0x2daa, 0x9, 0x1, r3}, 0x20) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x430) 12:52:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = getgid() r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x10000, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x2, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfshat={'smackfshat', 0x3d, '^\x00'}}, {@smackfsroot={'smackfsroot'}}, {@euid_gt={'euid>', r3}}]}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10bdf69da8c69e8090743209194d20f0"], 0x10) 12:52:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:01 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030c000000030303030303030ae093030300100000030302c757365725f69", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r0, &(0x7f00000000c0)={0x18, 0x0, 0x4, {0xfffffffffffffffc}}, 0x18) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:02 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101000, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000040)) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x113}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r2, 0x81}}, 0x10) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) write$P9_RWRITE(r0, &(0x7f0000000280)={0xb, 0x77, 0x2, 0x3}, 0xb) 12:52:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f00000001c0)={{0xa, 0x4e23, 0x7fffffff, @empty, 0x7235}, {0xa, 0x4e23, 0xff, @mcast1, 0x4a4}, 0x9, [0x0, 0x9, 0x3745, 0x6, 0x100, 0x6, 0x14, 0x40]}, 0x5c) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:02 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x12500, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000040)=0x3) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='/dev/audio\x00') 12:52:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f61643dafebcb3ec905000000211f425590db826428a9fd0674b9ab2feb517fcfd3ef9377f720879b8ba4fa0293946b1b1f7a5d5f14e48e91cad6f5053eb58f215928e319e1892945e1cd14381d959557da25eb63cd0fa0efb502ce2d742aff6ba201771ddd843fdd07ab6bfe89e1b9dafd7d98ce7f514103a34a51bee73fd324f6f333478850d4e890294e2fa1570596399b7ccf0033961e1a1a80e3c57f8ecb871133c84939ac1974aea503202698d51ec9347ad7cab08c7487603a10f0151f7779b17488aaf96b3ebb5a84146e3f3ba6d0e006c9a6894918cb9b103200d0b48d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xffffffffffff8001}}, {@default_permissions='default_permissions'}], [{@audit='audit'}, {@dont_hash='dont_hash'}, {@obj_type={'obj_type', 0x3d, 'procbdev,vmnet1vboxnet0cpuset,@em1'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@seclabel='seclabel'}, {@uid_gt={'uid>', r3}}, {@pcr={'pcr', 0x3d, 0x7}}]}}) r4 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000440)={{0x0, 0x9, 0x8000, 0x8000}, 'syz1\x00', 0x2a}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0x24d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x7, 0x0, 0x4}, 0x10) 12:52:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000140)) tkill(r3, 0x1000000000016) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:52:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) r1 = fcntl$getown(r0, 0x9) r2 = fcntl$getown(r0, 0x9) setpgid(r1, r2) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) mkdir(&(0x7f00000000c0)='./file0\x00', 0x60) 12:52:02 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x801, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000040)={0x6, 0x8000}) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:02 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000340)={'broute\x00', 0x0, 0x4, 0x69, [], 0xa, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)=""/105}, &(0x7f0000000000)=0x78) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000040)=0x106, 0x4) sendto$inet6(r2, &(0x7f00000001c0)="03004e0007000000fffffffafff55b4202938207d9fb3780", 0x18, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x20000000005, @local}, 0x1c) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=<0000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x11a1) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x4000, 0x0) 12:52:02 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x8000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x20) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 314.824963] skbuff: bad partial csum: csum=0/65535 headroom=146 headlen=14 12:52:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:02 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000200)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) r1 = gettid() r2 = getpgrp(0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x80000, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000040)={r3, r0, 0x3}) ioctl$RTC_IRQP_READ(r3, 0x8008700b, &(0x7f0000000080)) 12:52:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:03 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x0, 0x980914, 0xfdfa}) 12:52:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={0x0, 0x3}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={r2, 0x1}, 0x8) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, &(0x7f00000001c0)) 12:52:03 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) mkdirat(r2, &(0x7f00000002c0)='./file0\x00', 0x100) mkdirat(r1, &(0x7f0000000200)='./file0/file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f691a73", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mkdirat(r0, &(0x7f0000000280)='./file1\x00', 0x100) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r3, &(0x7f00000040c0), 0x1000) read$FUSE(r3, &(0x7f00000050c0), 0xfdfc) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f00000003c0)={0x9602, 0x1, 'client0\x00', 0xffffffff80000006, "4d4c179199c08879", "ae46c8ff259397392377d75089c26abd4d26483c2762af77bc8778a3d58ef685", 0xa7, 0x8000}) write$FUSE_INTERRUPT(r3, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0xffffffffffffff07) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="10000055154faf9bc48dc70000000000b6ab4cba2da0033a2816189d8d8a690a4e9eea674048d359ef2542e61f152bcc25b3c11acc38154c80e2dbfcb4fe902371a7cc3d29108a0a314afb05d920cf815353eb755aae226be006da5519f03cb2d1b20e4dceb43cd16ed11b3886435985cd59b5b639c0147babb564193021d1e704bc8a2463d0ab7bf3e954c521c8173d05c49f87b127f6a9f81499e1cc9b6a7ace6c33d7323d91fec38a9963cc720a1e849f054f26fcbe885d85"], 0x10) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x400000) 12:52:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000140)) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:52:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="70656375726974792e2b24242b6d643573756d6304007365745d2600978d2c9ebccdaf5395cd04ecddd16745178b3a"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x200, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000200)={0x7, 0x8000, 0xa, 0x0, 0x0, 0x8, 0x101, 0x9, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f00000002c0)={r3, 0xfffffffffffffff9, 0xe2}, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000001c0)=r2, 0x4) 12:52:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:03 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x1, 0x2) write$FUSE_IOCTL(r0, &(0x7f00000001c0)={0x20, 0xffffffffffffffda, 0x1, {0x0, 0x0, 0x80000001, 0x80000000}}, 0x20) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) write$FUSE_OPEN(r1, &(0x7f00000000c0)={0x20, 0x0, 0x2, {0x0, 0x2}}, 0x20) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x1, 0x280102) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f00000001c0)="d8c4f2a40f32662e0f01dfba200066ed66b9220200000f32ba4000ecba2000ec2e0f300f9684fe00", 0x28}], 0x1, 0x40, &(0x7f0000000280)=[@cr4={0x1, 0x2404}], 0x1) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) r1 = geteuid() getresuid(&(0x7f00000007c0)=0x0, &(0x7f0000000800), &(0x7f0000000880)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000009c0)=0xe8) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffffffffffff00, 0x7, &(0x7f0000000700)=[{&(0x7f00000003c0)="5415fb957b82a4dabb264ebd623c1b4484406be16d38c06e5f5427563dc00f41152f5c4e52d157ec679a29e2d5d5500402cca0bc3e900d7cd2f721884bb69847c355e90ac272ce2abaea77ca4a8c32f16c5ca6e280c5ee54b430b031ac953f3a183584ea8ed890cfa66484be465f120b44773bb30f9452afae210f59679003f8c42d3c382238a2", 0x87, 0x3ff}, {&(0x7f00000001c0)="0257ade2d9dc7af4df305f5cbc7dbe9e9695f7f0884307fb6452991b56049be22dcbda1be4065514e857bde4eefdb38e812c34c3cc05465b1d1c4261cf5913abb566b7bc37235f0492075fb5f9275aaf75323d41c0fbbab7fa6efab98be17b8b", 0x60, 0x1}, {&(0x7f0000000480)="513b7f18a5de7ac20d94d82f2f4f9fea197280719e14314c267f64b7696d1c17b76ef3aca774a522aebc7f55984962f189d13a157eb467ea9b4bc2f5463cf91a448ea74dcd32119968dee713faf70cbc0a372bcd765c38a5298df7746cc1644c73af1ed3e38ebdbe83495b1ab7a07663961b52b140a5df9f5888382674ad65c8b3532bd50c4bda03ded2c8ece102757dfc8d6c554417", 0x96, 0x1000}, {&(0x7f0000000540)="2713ad0db9aeb2765a55fc411b8950e18cc4b572524808cf18154f83b6137717650d9349def1c3c3b9fd9e29e479ab932776426b14634c5d77cf0c98ed23a1abc75eb0eed44ade4e99921ad84fcfd3e6122bf750be779218eae5dcc1c4c11370489d8dc5ea9aff2b42df73cca0ebeee56c1009eee573ab3edc91eac1276a378f3afa947baf2efcf5d53cc9ce7320e098fad8415c29375aa4eb412aced5374264e379d2369a27826730ed056463917bb9fa69123083d08e0e9d9ca45b36fc051a", 0xc0, 0x3ff}, {&(0x7f0000000600)="f93e898defef653f0799fddb361fa90142c4b53c87f060e4c2eb42a9ef01b521b488e48778460451304e7d0dabe29bdf06aa73852a720ff250f3aff5a0fbb010ddc3541c7ba3b6ebe2fe25d7033be568c7b2a2239b4e3e3640f466a3ffde480a304ad46e44ec08e60c7218082451d6cefd74d9ddf40dfd43d59752c47cf350563cfd48d10f5c44aba1c0f33c6c76aeae9ceac8ba28ac4edbf25b57ad7af450b6817ad3b14d041b6cadf026e0409e9a0d70aa4ee885f244f95468c6d2d4715ecc", 0xc0, 0x1}, {&(0x7f0000000280)="eb5817d7dd7f8810a08ba3808baa443f9c8cdfa111235fb5536173670f9533fd1bdee7cdef2609fef3c1b8f1481da8120a36e82bd5614b511c3275d48b869cef34a8aae0fc40a992af3f5df6f3fa0b061dadfb46a44fdc4258bec1194d86eae1e9b6fc00c05d56ec516c767d2ac3716149e0d79b4a40bc7c04beedbe6d7c", 0x7e, 0x6}, {&(0x7f00000006c0)="51d9a0d99ed437c1dedfef299a01d10866c1f968b222cd5ac312b1d55192a5a749de7da192", 0x25, 0x8}], 0x0, &(0x7f0000000a00)={[{@dmask={'dmask', 0x3d, 0x7f}}, {@errors_recover='errors=recover'}], [{@obj_user={'obj_user', 0x3d, '+'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@appraise='appraise'}, {@uid_eq={'uid', 0x3d, r3}}, {@permit_directio='permit_directio'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'fuse\x00'}}]}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 316.014403] ntfs: (device loop0): parse_options(): Unrecognized mount option obj_user. [ 316.022513] ntfs: (device loop0): parse_options(): Unrecognized mount option fowner. [ 316.037920] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise. [ 316.063399] ntfs: (device loop0): parse_options(): Unrecognized mount option permit_directio. [ 316.072562] ntfs: (device loop0): parse_options(): Unrecognized mount option smackfsfloor. 12:52:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000140)='($bdev\x00', 0xffffffffffffffff}, 0x30) write$FUSE_LK(r0, &(0x7f0000000200)={0x28, 0x0, 0x3, {{0x4, 0xfffffffffffffff9, 0x1, r1}}}, 0x28) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c1564653d30303030303030303030303030303030303034303030302c757365725f69643d0000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000280)={0x8, 0x3, 0x7fff, 0xffffffff, 0xfffffffffffffffb, 0x7}) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f00000050c0), 0xfdfc) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f00000002c0)={0x1f}) write$FUSE_INTERRUPT(r2, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="10000000000000000492d10000000000"], 0x10) 12:52:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, 0x0) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:52:04 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000580)={0xfffffffffffffffc, 0x31424752, 0x100, 0xffff, 0x3, @discrete={0x7, 0x8}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40000, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f0000000280)={@local, @local, @multicast1}, &(0x7f00000002c0)=0xc) openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x0, 0x0) write$input_event(r1, &(0x7f0000000040)={{}, 0x5, 0x1a, 0x1f}, 0x18) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000380)={r2, 0x5, 0x8, 0x27, 0x2, 0xdd3, 0x8}) bind$bt_l2cap(r1, &(0x7f0000000300)={0x1f, 0x10001, {0x42d, 0x100, 0x1, 0x49, 0x6e11, 0x9}, 0x2, 0x4}, 0xe) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000003c0)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000440)={0x6, 0x118, 0xfa00, {{0x4, 0x527, "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", 0x1a, 0xf416, 0xffffffff, 0x9, 0x843, 0x6, 0x7f}, r3}}, 0x120) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000200)={0x8, "9bed48c42e88c06939dfde22e54344cf1049a624f3d16386672eb99d457ef714", 0x200, 0x7fff, 0x3, 0x1, 0x1}) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e22, @rand_addr=0x4}, 0x10) 12:52:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10000080000000e60300000080000000"], 0x10) 12:52:04 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000001300)={0x1, 0x980914, 0xfdfd}) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x20, 0x2, &(0x7f0000001280)=[{&(0x7f0000000200)="6088d5c2832b405c15b6ea5845f5402834300a2d5e1c37ac58db04134825b2055982e3d58edb01b81bbf8ceadad0e327f12212bcd6972f695f0f78bd0e4ee6a959fa781ac444f7ca24321f39937118d60551b13445d6d3c14961520ce9cf80926ec464a5e621035611d1678d", 0x6c, 0x47}, {&(0x7f0000000280)="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", 0x1000, 0xb2b2}], 0x120090, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40080, 0x0) 12:52:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, 0x0) timer_settime(0x0, 0x0, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x200000) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='cgroup.events\x00', 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000003c0)={r2, r3, 0x8, 0x10001, &(0x7f00000001c0)="6e5679e763e6bc581953a06eb14df8ee973cf11f521e7d00ad8972e3746f57d08b", 0x65, 0x7, 0x401, 0x7f, 0x6, 0x386, 0x400, "6b3d7ae6044cd664acbc21781bd10ebbbd3a7a6914ffcea2e73d637d106e67819fc7405ce687c08591db2201ac2d610f21b3ad9faa5c12c3294ffa8f7bec182c6d266016b95a02b0bbe46701a5287e2a6c0e0c20ae2b284c646c3c6a8fd757c76b42458315f265bdee448233a5f20ad2e2827e34ab4354d5293ac14f2d0f610a823cb0284d2e9e61a744186295fe252f5fb2848d039a90ca13e732d4f90a"}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) gettid() sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:52:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x810, r0, 0x0) 12:52:05 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xf5, 0x140) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) 12:52:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x20, 0x500) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfe85) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000140)={0x0, 0x7530}, 0x10) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x10400, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="10000000000064fd87406a1d478e8d2304ba209ba0bbdb0c7ad54cac2459084f6d29fe17a93ac937a443e69488a90e5697ed183806bef802cc35bd814ba403d14f4c1f6c0db20eaffdc2d498763c433d85d34e121c99e6f33e3bbe5686b7480a0d01e2edfa2e90e6a1d662a761984c368cdf609c51c3f84bf35d5036ea464d5057d32ed70cff817d0df0d37955d2bb57aaca96d7545fb96b48"], 0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000280)={0x0, 0x41, "d51b4a94d19e51de134d6014b7df5a5f90544073aaf8e4a2585cf3166359b471785cefb8fba807627b88aef51b076743f40f6585f919d44c3289785fc4c148e05b"}, &(0x7f0000000200)=0x49) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000480)={r3, @in={{0x2, 0x4e23, @remote}}, 0x3, 0x196d}, 0x90) 12:52:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f0000000880), 0xffffffffffffff78) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)={0x2e, 0x4, 0x0, {0x1, 0x1, 0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2e) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000140)={0x18, 0x1, 0x0, {0x8}}, 0x18) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x10000, 0x10) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$TIOCCONS(r1, 0x541d) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) socketpair(0x2, 0xf, 0x5, &(0x7f0000000200)) 12:52:05 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x14902, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000040)={0x1, 0x3f, 0xea4f, 0x1ff}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x800, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x28, &(0x7f0000000280)={0x0, 0x0}}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r3, 0xfffffffffffffff7, 0x8}, 0xc) 12:52:05 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x42) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000180)={0x7, 0x0, [{0x181, 0x0, 0x3}, {0x40000bff, 0x0, 0x3e}, {0x3a8, 0x0, 0x2}, {0xbf7, 0x0, 0x7}, {0xaf5, 0x0, 0x401}, {0x9ff, 0x0, 0x210}, {0xa48, 0x0, 0x8}]}) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f00000002c0)={0x0, @data}) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x101400) read(r0, &(0x7f0000000040)=""/92, 0x5c) ioctl$KDSETLED(r2, 0x4b32, 0xfffffffffffffff9) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:05 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000000)={0x1, 0xfffffffffffffffb, 0x300c, 0x1}) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:05 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0x4, 0x7, 0xf0dc, 0x5, 0xffffffffffff5318, 0x9}, 0x80000000}, 0xa) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:06 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80000, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:52:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:06 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f00000002c0)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x33, 0x8}) 12:52:06 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000040)={0x9, 0x80000000, 0xffff, [], &(0x7f0000000000)=0xe999}) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) flock(r0, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x800, 0x0) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f00000001c0)={0x4000, 0xf001, 0x5, 0x20, 0x1}) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0xd) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) write$smack_current(r1, &(0x7f0000000200)='+$$+md5sumcpuset]&\x00', 0x13) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video1\x00', 0x2, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:06 executing program 1: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x3, 0x1b071, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000002, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x8, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000100)={0x1, 0x2, 0x47, &(0x7f0000000000)="eefffe65e15f4542c9dd0adfebd97c036021a1468851ca5b0069df889bae90463f598fff48707e2207bfc33929310e3670f0f8923d575f6a4409d158c2a74bbc93c8d349342ab8"}) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000280)=0x8) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x4010, r2, 0x0) 12:52:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000040)={0xfffffffffffffffe}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) r3 = socket(0x3, 0x800, 0x404) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000004c0)={0x0, 0x10001, 0x3, [0x7f, 0x9, 0x3]}, &(0x7f0000000500)=0xe) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000540)=@assoc_value={0x0, 0x51}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f00000005c0)={r5, 0x0, 0x5, 0x8c, 0x6, 0x81, 0x6b4, 0x400001ff, {r4, @in6={{0xa, 0x4e23, 0xb6, @mcast2, 0x4}}, 0x4, 0x1ff, 0x3, 0x5, 0x9}}, &(0x7f0000000480)=0xb0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000002c0)={0x1, 0x2, 0x7, 0x1e4a, r6}, 0x10) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair(0xa, 0x80000, 0x4, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r7, &(0x7f00000001c0)=@generic={0x1a, "82fe46b5e53f2b0dad71c15498eb94506ca8a6a1b45bf169dcbda60185af83f29c481d82c7c35c088558aea688663365f5bfb9d749100b9955672786ec3ed73dfdba84a7c5b35220910aad9e528cfca0e6a721248f1f88ee85aee33c52f2be2f731c6d4156ed608b2d303f255f3e2a2d4974e199818a22c3a5881631723c"}, 0x80) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000140)={0x10, 0x0, 0x84}, 0x10) 12:52:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 318.601272] mmap: syz-executor1 (11889) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 12:52:06 executing program 1: ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, &(0x7f0000000200)={0x0, @data}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) sched_rr_get_interval(r0, &(0x7f0000000040)) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:06 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000040)={0x10002, 0x0, [0x2, 0x9, 0xfffffffffffffc00, 0x1, 0x0, 0x1, 0x7, 0x2]}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:06 executing program 1: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x3, 0x1b071, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000002, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x8, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000100)={0x1, 0x2, 0x47, &(0x7f0000000000)="eefffe65e15f4542c9dd0adfebd97c036021a1468851ca5b0069df889bae90463f598fff48707e2207bfc33929310e3670f0f8923d575f6a4409d158c2a74bbc93c8d349342ab8"}) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000280)=0x8) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x4010, r2, 0x0) 12:52:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x2, 0x4}, 0x10) 12:52:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:52:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, 0x0, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, 0x0, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000c40)={r2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r6, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r6, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r4, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r7, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r6, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r9, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r10, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r10, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:07 executing program 1: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x3, 0x1b071, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000002, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x8, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000100)={0x1, 0x2, 0x47, &(0x7f0000000000)="eefffe65e15f4542c9dd0adfebd97c036021a1468851ca5b0069df889bae90463f598fff48707e2207bfc33929310e3670f0f8923d575f6a4409d158c2a74bbc93c8d349342ab8"}) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000280)=0x8) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x4010, r2, 0x0) 12:52:07 executing program 1: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x3, 0x1b071, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000002, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x8, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000100)={0x1, 0x2, 0x47, &(0x7f0000000000)="eefffe65e15f4542c9dd0adfebd97c036021a1468851ca5b0069df889bae90463f598fff48707e2207bfc33929310e3670f0f8923d575f6a4409d158c2a74bbc93c8d349342ab8"}) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000280)=0x8) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x4010, r2, 0x0) 12:52:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x20, 0x500) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfe85) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000140)={0x0, 0x7530}, 0x10) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x10400, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="10000000000064fd87406a1d478e8d2304ba209ba0bbdb0c7ad54cac2459084f6d29fe17a93ac937a443e69488a90e5697ed183806bef802cc35bd814ba403d14f4c1f6c0db20eaffdc2d498763c433d85d34e121c99e6f33e3bbe5686b7480a0d01e2edfa2e90e6a1d662a761984c368cdf609c51c3f84bf35d5036ea464d5057d32ed70cff817d0df0d37955d2bb57aaca96d7545fb96b48"], 0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000280)={0x0, 0x41, "d51b4a94d19e51de134d6014b7df5a5f90544073aaf8e4a2585cf3166359b471785cefb8fba807627b88aef51b076743f40f6585f919d44c3289785fc4c148e05b"}, &(0x7f0000000200)=0x49) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000480)={r3, @in={{0x2, 0x4e23, @remote}}, 0x3, 0x196d}, 0x90) 12:52:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="7065637553e59a4cb79b05782b00643573756d6370757365745d2600"]) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x44000, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000280)=""/31) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @empty}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) getuid() ioprio_get$uid(0x0, r2) 12:52:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x101400, 0x0) mkdirat(r1, &(0x7f00000002c0)='./file1\x00', 0x8) r2 = getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) mount$fuse(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='fuse\x00', 0xa20811fef91eed1f, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other'}], [{@subj_type={'subj_type'}}]}}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:52:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, 0x0, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000c40)={r2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r6, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r6, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r4, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r7, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r6, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r9, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r10, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r10, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000000c0), 0x4) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="1000004578a958000400000000000000"], 0x10) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x208000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) 12:52:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x2, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f00000001c0)=""/78) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x40, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000140)={0x28, 0x2, 0x0, {0x4, 0x66a2, 0x1df}}, 0x28) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f00000001c0)={0x402d2c70, "572a47b8f991e8c90feed8c58d397d143eeefaf5662970141a658411b01bff18", 0x2, 0x8, 0x1000, 0x413455a5a0b53bbe, 0xc}) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:08 executing program 0: pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000001400)='./file0\x00', r0}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) getdents64(r1, &(0x7f00000014c0)=""/21, 0x15) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r2, &(0x7f00000040c0), 0x1000) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000001500)={{0x40, 0x75}, {0x8, 0x6}, 0x4, 0x2, 0x9}) read$FUSE(r2, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r2, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r2, &(0x7f0000000400), 0x1000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000001440)={0x7f, 0x3, {0x1, 0x3, 0xff, 0x1, 0x21c}}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) r3 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f00000001c0)=""/99, &(0x7f0000000140)=0x63) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000040)={0x10, 0x0, 0x4}, 0x10) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000280)={0x1, {0x0, 0x989680}, 0x7ff, 0x7}) 12:52:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:52:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, 0x0, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000c40)={r2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r6, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r6, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r4, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r7, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r6, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r9, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r10, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r10, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x1, 0x400000) getdents(r1, &(0x7f00000001c0)=""/98, 0x62) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40), 0x0, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:52:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xff, 0x800) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000140)) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0xbd02) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f0000000880), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, 0x0, 0x0) 12:52:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{0x0}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:52:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="706500fd0016000000745d2f00"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f00000003c0)=""/143) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x3}, 0x10) write$FUSE_INTERRUPT(r1, &(0x7f00000001c0)={0x10, 0xfffffffffffffff5, 0x1000000000000008}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10001100000000000400000000000000"], 0x10) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x400, 0x101001) 12:52:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000680)='/dev/autofs\x00', 0x400, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000006c0)={0x8, {{0x2, 0x4e20, @loopback}}, 0x1, 0x1, [{{0x2, 0x4e22, @multicast2}}]}, 0x110) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10}, 0x10) 12:52:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfffffffffffffe84) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:52:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0xd) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000140)={0xe609, 0x7}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="706588f64790ca637572690000000024242b6d6435730eff5e4bd46d"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = socket(0x5, 0x0, 0x10001) bind$bt_sco(r1, &(0x7f00000000c0)={0x1f, {0x800, 0x1, 0x4, 0x0, 0x7fff, 0x1}}, 0x8) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, 0x0, 0x0) 12:52:12 executing program 0: r0 = inotify_init() fcntl$setflags(r0, 0x2, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x40000, 0x0) write$P9_RLOCK(r2, &(0x7f0000000140)={0x8, 0x35, 0x2, 0x3}, 0x8) read$FUSE(r1, &(0x7f00000040c0), 0x1000) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000200)=0x10) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x1000000408000, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'osx.', 'pecurity.'}) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000140)={@multicast1, @empty, @dev={0xac, 0x14, 0x14, 0x1b}}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0xffffffffffffffff, &(0x7f0000000880)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x3ffa}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x3d3b}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@subj_user={'subj_user', 0x3d, 'user_id'}}]}}) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000280)={0x2, 0x5}, 0x2) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="05003d90349b2936b9fd119fee8d7e037942f25098696232022285cba1f4a23891847f06d97c6c7c6f25fc495ef86f149fcd4278a7dc88df510c16e3782c5a9504f89f81001f658b803dd3b667cd2a272485f5ce2cbee0922daa513ba5c746ebdb647b9361c8a30cd80000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="205e78aeae4a57ea1321afd0f92b6d6435e35a8ed43578f0c6745d26000000000000000000000000"]) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000580), &(0x7f00000005c0)=0x4) read$FUSE(r0, &(0x7f0000000e00), 0xffffffffffffff70) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e20, 0xd01d, @empty, 0x1}}, 0x9, 0x1, 0x3, 0x6, 0x1ff}, &(0x7f00000002c0)=0x98) ioctl$RTC_PIE_ON(r2, 0x7005) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000400)={r3, 0x1, 0x30, 0x3414, 0x5}, &(0x7f0000000540)=0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000880)={0x548, 0x0, 0x4, [{{0x5, 0x2, 0x9fe, 0x0, 0x6e7e, 0x1, {0x6, 0x2, 0x59a6, 0xffff, 0x9, 0xc9, 0xd75, 0x10001, 0x3, 0x3, 0x70, r4, r7, 0x1, 0x68ab5aaf}}, {0x1, 0xa018, 0x9, 0xff, 'pecurity.'}}, {{0x2, 0x3, 0x80, 0x3, 0x9a0a, 0x8, {0x0, 0x80000001, 0x800, 0x6, 0x2, 0x7, 0x1, 0x0, 0x400, 0x1000, 0x7, r6, r5, 0xfffffffffffffff7, 0xfffffffffffffffa}}, {0x4, 0x8, 0x0, 0xff}}, {{0x1, 0x3, 0x0, 0x80, 0x7fffffff, 0x7f, {0x3, 0x8, 0x703, 0x8, 0x33c, 0x2, 0x8001, 0x65b5, 0x2, 0x7, 0x5, r6, r7, 0x0, 0x800}}, {0x6, 0xf35, 0x9, 0x0, 'pecurity.'}}, {{0x2, 0x0, 0x9, 0x80000000, 0x1, 0x7, {0x2, 0x8001, 0x4, 0x8, 0x100000000, 0x0, 0x800, 0x9, 0x1, 0x80000001, 0x3f, r4, r5, 0xfffffffeffffffff, 0x3}}, {0x0, 0x10001, 0x7, 0x9, 'wlan1(&'}}, {{0x5, 0x1, 0xff, 0xff, 0xe1, 0x2, {0x2, 0x9, 0x4, 0x0, 0xe8, 0x1f, 0x1f, 0x3, 0x20772bb7, 0xfffffffffffffff9, 0x1, r4, r7, 0xffffffffffff45f0, 0x5}}, {0x5, 0x100000001, 0x9, 0x5, 'pecurity.'}}, {{0x6, 0x3, 0x4, 0x5, 0x100000001, 0x8, {0x3, 0x7, 0x5ce, 0x5, 0xff15, 0xff, 0xffff, 0x5, 0x80000001, 0x7, 0x8, r4, r5, 0xfa, 0x3}}, {0x5, 0x7f, 0x8, 0x0, 'group_id'}}, {{0x4, 0x1, 0x5d4b, 0x5, 0x27, 0x6, {0x0, 0x7f, 0x2, 0x2231, 0x6, 0x20, 0x7, 0x3, 0x1, 0x1, 0x8, r6, r5, 0x2, 0x6}}, {0x4, 0x9, 0x8, 0x2, 'rootmode'}}, {{0x5, 0x3, 0xfffffffffffffffe, 0x7, 0xffffffffffffffff, 0xfffffffffffffa5e, {0x1, 0xd8d6, 0x4b, 0x9, 0x1, 0x5, 0x100, 0x0, 0x7, 0x81, 0x7, r6, r7, 0x7fffffff, 0x4}}, {0x1, 0x8, 0x2e, 0x8, 'security#keyring[vboxnet0em1*security,bdevem1!'}}]}, 0x548) 12:52:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) membarrier(0x1, 0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions='default_permissions'}], [{@context={'context', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'pecurity.'}}, {@fsname={'fsname', 0x3d, 'group_id'}}]}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="70656375726974792e2b2424a3f589de63756d637075736574592600"]) read$FUSE(r0, &(0x7f00000040c0), 0x13e0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x109593c2f305b29d, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x40000, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000140)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:52:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) [ 324.380886] Unknown ioctl 21545 12:52:12 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0}, &(0x7f0000000980)=0xc) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x37, 0x5, &(0x7f0000000280)=[{&(0x7f0000000540)="5752334ee1cc95d3751c356be355c843ba3a8427d2761a53b08afb80cce63bb9263fde8973d7c8915a64d5bea96d0d3d1835266e83dc0286ed1b93aaf6782f9c51f6ecf89fcd86e2f6a4a33d2bbb5fa1c6543b0513dc465628b9821b3756546f8287e57ff33dd30dfe9a05c600e0155ac763a62cb391bce7e36342a1019a6bbb16e7001cba00b9ca60d907f785c14f9e48fd972e9b66e08105c4e0ca4f8dabe6329c49f97c6f517ae8123bbe936463f6fd3ffcfc8fcb43e30fb1e0ad9c69dc3a42b4ad1774b1bf470f553421e4f096ac29ea22e02a8d41", 0xd7, 0x9a8}, {&(0x7f0000000640)="a2fe69a7c28511a7a045e59b3ac70fbfcb2563bc7578bc6dfd86ba2cb4fdbd0afa536824a2034aee78bf234f55d7bb8c6cc30676a6ebbc9ac15f6afc4a49e304225358aad01feccefd5514c828abed663ae102238fe79b622956484b86dc146218a35183469f2bbf9598eca91668b4a678b33399a415e537ce5a4eb433d0d2de024b4da4d32a07af9cad1dd06faf4f88f4b3782b16abface2b19b984ef55ba7c6a2fa16b40b901d0a7c17144819d", 0xae, 0x6}, {&(0x7f0000000700)="da76c55ae28d5f90b443eaaba882da20ae6643d957e4702b2e6aba95fae75666662deaaa078bafee108d95052e2ce121c6b8672a221c97338800df653250243f7881321ca3e6a8f13967c71bc3a1e9e7cb80ef7ee2cb7680ffc3be3568150b619363dc0ab8ba32854b7aed2ce3bf50e5339966f2787fd98469715dbb6441e1e86d0c16522a46465a3a96a8bbc4262a36d56d166431286c2ea6e036560feb32064a333bb7701e756f7de0b5b11ac69e66887f4e571999c7ed46c449e3ae1576378a63745dc897827deebf07d9c794ff2e778a016d393ea37d778a0d63291dc4be27da91ab1c79040b29d68e677d274f", 0xef, 0x8}, {&(0x7f0000000880)="27912d6eefa2d9b37e6ec6a61c6452b7ea741eef60790212f638d1d01b68980d48be317a9726b1bb5e2077d620c6f48e3bc59ab0f19f14ee24297464c8f070076bc448d7f13b32e2be9e08a91ba9cc24b603ee9ee8e081ec50dd0ad95b3a1329a7f88f81645f4a5f08ca68d045d04832592267325f072fe5845cdb7c7518c94c1f957c48bae928738b93c8434b46a015e8b5beac250bd3d8f3a12f7d624b740e36dd076480ca9ceeb46bb64c22c69d6765542b558334c0b7aeb717f1d4819d0b583c7e", 0xc3, 0x9}, {&(0x7f0000000200)="23f57dd511454dc5ab50be9c4cd3b7798279db338118ec", 0x17, 0x6}], 0x402, &(0x7f00000009c0)={[{@skip_balance='skip_balance'}, {@treelog='treelog'}, {@degraded='degraded'}, {@skip_balance='skip_balance'}, {@nossd='nossd'}, {@discard='discard'}, {@noenospc_debug='noenospc_debug'}], [{@subj_user={'subj_user'}}, {@obj_user={'obj_user'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@smackfshat={'smackfshat', 0x3d, 'I'}}, {@dont_hash='dont_hash'}, {@obj_user={'obj_user', 0x3d, '{'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_gt={'fowner>', r0}}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x680, 0x0) ioctl$VIDIOC_RESERVED(r2, 0x5601, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) perf_event_open$cgroup(&(0x7f0000000f00)={0x0, 0x70, 0x6, 0x5, 0x0, 0x401, 0x0, 0x10000, 0x0, 0x2, 0xf0a, 0x9, 0x4b8, 0xa00, 0x8, 0x4, 0x7, 0x81, 0x1000000000, 0x7f, 0xfff, 0x8, 0x6, 0x1ff, 0x5, 0x7ff, 0x3fe, 0x0, 0x100000000, 0xaab, 0x5, 0x5, 0x6, 0x80000001, 0x8, 0x2400, 0xa4b, 0x2, 0x0, 0x1000, 0x2, @perf_config_ext={0x101, 0x7fffffff}, 0x1, 0x400, 0x1, 0x2, 0x5, 0x7, 0x100000000}, r2, 0x6, r2, 0x4) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f00000003c0)=[@in6={0xa, 0x4e24, 0x616, @mcast2, 0x7}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e24, 0x99c, @remote, 0x7ff}, @in6={0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0xf}, 0x8000}, @in6={0xa, 0x4e22, 0x3, @remote, 0x9ccf}], 0x90) syz_mount_image$gfs2(&(0x7f0000000ac0)='gfs2\x00', &(0x7f0000000b00)='./file1\x00', 0x7, 0x4, &(0x7f0000000e40)=[{&(0x7f0000000b40)="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", 0xfe, 0x1ff4}, {&(0x7f0000000c40)="64b9d38f47e8d127c2a38923cc6734add583e77ba4d186242f6e671cd45b0ce91dbc3ea3940586c343cef4ab6dfe6badfa6f38cc4b1031ebd7d2a1dec93f45f68d51729e2bf07df8397ec1dc4813afbf5051b698830f3d8307144d7fcad4a89cfc67d93a911a3c370f9e7e9343abd522457e9dad2fd9148ff1a92dcaa274503e5030761338ec37509676f0b9d1cf28f4bf8f0cc6d95a650dec7155930226f985b2fcd0890b3da089635b14e0fbd1ceeba3e8e43f14b1a5", 0xb7, 0x5}, {&(0x7f0000000d00)="752a5d7ac814e5ef998f8452cc9273fba5f12aeb684b545e72d25d3d8a560371202a3533b3738e9c79cfe0868bbf0760e417fd5d41651c392eb1373efb7e6ce396b440e3804f0d3c482b344ffe2f7aee1dbfac3ca19374e998cab6d313f3c4839ec3b80538d3b1eed42cb5b6005b79cd79a66f59728f9f6257af88abe2a046240a89b698e5ef198c29c1fc54b5153358c96d1e001e566429dc921ade23d91c4de2d302e133", 0xa5, 0x6}, {&(0x7f0000000dc0)="352a1ded4b48764e44f44b376ea9b2b8f987c61fd62af279bc6520e935500a1eb60fef222a81eafacc2bcc9674c3725ed0df3e1dbab2bae60cb03e148a891f3a5a6b9d977945b4206a34", 0x4a, 0x8}], 0x22040, &(0x7f0000000ec0)={[{@nosuiddir='nosuiddir'}, {@nosuiddir='nosuiddir'}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="10000000000000000008000000000000"], 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000480)={0x3, 0x200, 0x4, 'queue0\x00', 0x1}) [ 324.494753] Unknown ioctl 21545 12:52:12 executing program 5: r0 = inotify_init() fcntl$setflags(r0, 0x2, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x40000, 0x0) write$P9_RLOCK(r2, &(0x7f0000000140)={0x8, 0x35, 0x2, 0x3}, 0x8) read$FUSE(r1, &(0x7f00000040c0), 0x1000) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000200)=0x10) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40), 0x0, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000c40)={r2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r6, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r6, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r4, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r7, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r6, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r9, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r10, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r10, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000ee243e686436a3de6d156607a7e752584a3a8ed59347379bd22cb8177d1f8c2690e780e7b258b83438d86f7dd775410c7e5de3735cfca74bb94eb1a686735f590b9e05d59d2d43ecc71a93dce2b5fd330f18fae6a0529eefe1b5352743d4e77c890aee68500cb7a282c6835fc68f495f37c93d9f50764473a32df154385438918566df16ec26c300df9ffc6a8a52552d9c473edd426b68929f516ade99c66e7bdf39dd82"], 0x10) 12:52:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:52:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x6, 0x20000) write$uinput_user_dev(r1, &(0x7f00000003c0)={'syz1\x00', {0x80000000, 0x3, 0x3}, 0x2, [0x9f, 0x4, 0x101, 0xff, 0x0, 0x1, 0x18000000, 0xb4, 0x3, 0x8, 0x101, 0x7, 0x7, 0xfffffffffffffff8, 0x6, 0xfff, 0x1, 0x5, 0xff, 0x6, 0x200, 0x9, 0x5, 0x5, 0x2a80c00000, 0x80000001, 0xffff, 0x7, 0x3, 0x0, 0x20, 0x0, 0x6, 0x1000, 0x5, 0x1, 0x1, 0x101, 0x3f, 0x1, 0x437, 0x6, 0xf0, 0x90000000000, 0xffffffffffff6ea0, 0x1, 0x8, 0xad, 0x200, 0x100, 0x2, 0x5085cbda, 0xffffffffffffa152, 0x3, 0x2, 0x10000, 0xd8, 0x7ff, 0x0, 0x7f, 0x2, 0x7, 0x7ff, 0x5], [0x6, 0x3, 0x6, 0xad3, 0xfffffffffffffffb, 0xb6, 0x401, 0xff, 0x3, 0xffffffffffffffff, 0x8, 0x2, 0x5, 0x1ff, 0x1ff, 0x3, 0xa03, 0x10001, 0xa7, 0x4, 0x8, 0x47, 0x6, 0x2, 0x912, 0x122b, 0x0, 0x9, 0x3c00000000000, 0x200, 0x107, 0xffffffff, 0x80000001, 0x401, 0x7, 0xffffffff, 0x220, 0xee6, 0xadd, 0x4, 0x0, 0x101, 0x5, 0x80000001, 0x7, 0x7fff, 0x5, 0x2, 0xffff, 0x1, 0x1000, 0x4, 0xfffffffffffffffc, 0x5, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x0, 0x30, 0x4, 0xa493, 0x100, 0x4], [0x0, 0x80, 0x61828234, 0x68, 0x0, 0xfffffffffffffffc, 0x80000001, 0x3f, 0x8, 0x10001, 0x7, 0x5, 0x8, 0x4, 0x8, 0x3, 0x1f, 0x9, 0xbcab, 0x0, 0xda8, 0x100, 0x0, 0x4700, 0x7, 0x3, 0x81, 0x72f, 0x6, 0x2520e7f7, 0x100000001, 0x2, 0xb6, 0xcf8, 0x0, 0x4, 0x7fffffff, 0x3, 0x9, 0x9, 0x530, 0x5b9, 0x2b, 0x7, 0x8, 0x4, 0x7f, 0x1, 0x3, 0x100000001, 0xb58, 0x7, 0x0, 0x5, 0x7fff, 0x1, 0x7fff, 0x3, 0x86d, 0x3, 0xffff, 0xa0, 0x10001, 0x9], [0x2, 0xf0, 0x3, 0x3f, 0xcd16, 0x5, 0xffffffff, 0x1000, 0xdc, 0x7fffffff, 0xd4ad, 0x1, 0x5, 0x10000, 0x3ff, 0x5, 0x0, 0x7, 0xfb, 0x614, 0x7, 0x6, 0x0, 0x2, 0x5, 0x8000, 0x200, 0xffffffffffffffff, 0x3, 0x3f, 0x3, 0x7, 0x3, 0x0, 0x6, 0x2b95, 0x85, 0x7, 0x2, 0x8, 0x4, 0x357, 0x8, 0x9, 0x5, 0x7, 0x80, 0x38e0e565, 0x2, 0x2b, 0x8, 0x1f, 0x6, 0xffffffff, 0x6, 0x7, 0x1, 0x4, 0x100, 0xdaf0, 0x90, 0x4, 0xffffffffffffffc1, 0x8]}, 0x45c) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='pecurity.+$$+md5sumcpuse&\x00\x00\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000c40)={r2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r6, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r6, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r4, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r7, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r6, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r9, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r10, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r10, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = semget$private(0x0, 0x7, 0x102) semop(r0, &(0x7f0000000040)=[{0x3, 0x1, 0x800}], 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)=@random={'system.', 'fuse\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000c40)={r2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r6, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r6, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r4, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r7, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r6, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r9, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r10, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r10, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet_sctp(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:52:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1000000000000000040000000000000049ac028e37fa8f2fecb42d49ca8173bf33b8206aae7355d7497354de95d7b5040aaa5d823228e5485ca5dc3fdc87e83650354aca248ccdc59ff2482a323d3de6ba45c010fc77b64f497e84035233cc0c100ce0aacf561cc73d1737467cafecb1e667a4c2d204de09a7"], 0x10) 12:52:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2001, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x9}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={r2, 0x6}, 0x8) 12:52:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000880)=""/4096) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x101040, 0x0) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000280)={{&(0x7f0000000140)=""/27, 0x1b}, &(0x7f00000002c0), 0x32}, 0x20) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, 0x0, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000c40)={r2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r6, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r6, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r4, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r7, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r6, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r9, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r10, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r10, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:14 executing program 2: r0 = socket$inet6(0xa, 0x4, 0x800) setsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f0000000800)=0x9, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) r4 = getgid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x8, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffff8}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xe00}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x6419d5f5}}], [{@uid_gt={'uid>', r5}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@dont_measure='dont_measure'}, {@audit='audit'}, {@measure='measure'}, {@fsname={'fsname'}}]}}) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000200)={0x0, 0x400, 0x1, [], &(0x7f00000001c0)={0x9f09e1, 0x7, [], @p_u8=&(0x7f0000000140)=0x5}}) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000c40)={r2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r6, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r6, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r4, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r7, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r6, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r9, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r10, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r10, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) poll(&(0x7f00000000c0)=[{}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(0xffffffffffffffff, 0x7) accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) 12:52:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x10400, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_GETXATTR(r0, &(0x7f0000000140)={0x18, 0x0, 0x8, {0xb9a4}}, 0x18) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x2100, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 327.197155] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value [ 327.215351] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value 12:52:15 executing program 0: r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x3, 0x80700) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000005c0)={0x0, 0x8}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x2, 0x7}, &(0x7f0000000700)=0x90) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000740)={0x0, 0x6}, &(0x7f0000000780)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000e00)={0x0, 0xc6bf}, &(0x7f0000000e40)=0x8) sendmmsg$inet_sctp(r0, &(0x7f0000001480)=[{&(0x7f0000000140)=@in={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000580)=[{&(0x7f00000003c0)="9e20404047b072c56dee94ac5ef406c677eba06ef7ffecf37bae7f26bfac6659c58231871da66d7d55afb8378cc3f99915231c203e012a0234be74514b7a2578d94d811c2ba254c8824991a91655e3883544f8299fefe18692c907f3ae27a768d4f1212a0b12d20c4ba3a7ea7239ba7ad65229f74c10d57d8dbfdfb2e7e0d784dca54190564723654b75e3d5d5286a0b12f1175381cf01fb0e7199bd5b8680e273a2feaac5572378f9e0f8fa8c4d809f88ed513c2be6aa60a1949382333bdb73d0edfe64481b51fd1ea1", 0xca}, {&(0x7f0000000280)="4a4b37b0d1fbfc86ec555a1e5828cb12df01102d55c5feafe8e11ace0f528b6e", 0x20}, {&(0x7f00000004c0)="70ded477cdd070868876eaed8f67f2c281d22e889dad28394d497f840fa13d38b05866005143282815b66c18afb127d2d287f88119c75509bab8c5b76d3c5b530bacead54af0ab4b86fc52d1b88c0b6302546481f1f37ffe269b0de8258531c5d0673c785ab738d3df563344a45e6fecb5474050cad91bdd6031155501fc4e24c4bfe184abc14cede9a07a6daffc36e3b056", 0x92}, {&(0x7f00000002c0)="6e8f5fcb9b36715bd5ae369da9c32d429c03ea972efcee5926947164ec1ac2c06334d9afc9cb89d33ef592ecb1874c7cf3", 0x31}], 0x4, &(0x7f00000007c0)=[@dstaddrv6={0x20}, @sndrcv={0x30, 0x84, 0x1, {0x6bd, 0x4, 0x2, 0xefb, 0xfffffffffffffffb, 0x2, 0x5, 0x9, r1}}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x9}, @sndinfo={0x20, 0x84, 0x2, {0x40000000, 0x201, 0x3, 0x4, r2}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0xb316, 0x204, 0x4, 0x101, 0x4, 0x9, 0x100, r3}}], 0x110, 0x24004800}, {&(0x7f0000000900)=@in={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000d80)=[{&(0x7f0000000940)="954b06cd777c8d5b71c31d40ed81ec804e88841ec6efd09665853428d813433daecab65d16bab2a2eac6a3b6bd79b17aa7ca840edc935f4e004f6d5d42721641e4b3e615341c095588afbf416c9ce4b55ebc487411447215526259b0185fc8c654c4b973c3a3206f23b44d5190f4827c7f8bc1eabbdaf109c458cd9dc5e67abd6bc527d97c3acf19f85530d953455ee814b07087d376f190d136227b1bb23e1285469783a7d707b175", 0xa9}, {&(0x7f0000000a00)="7e92629a5c4d9da4ae7d1ad1f78c2b3b7cb635f0db180e529dc4588e71b73c7b84db442d5459608acac39b4697c8740be6901c255800294c12f9c750f5925d2e8db243607df66ed1d6cfffa5c0874f5097c4105dbb62bf90cc90eed565c49eef7390933c0d98a06b4e696f0d5a985f2b2913061d461ff0c09620a7086a44dc676c7c71b3296311f6aee094cd7f4af8b80bbe76ff9e6b8965928854ab3ceaefe7caf26f4c25950924a1668a98b4534bf6b3c77293ebfb660ca253e176ffe990569e72855d38", 0xc5}, {&(0x7f0000000b00)="3684075449d27d18da6333770f6c3d483737cef5d379b0cd794d5157515602f6d2fc45f2195a10e5dd311f3d8c47315eb2c46308749e7aac1b77fbf0dae1b6b9d415ffad8d2d2384c17b2f79b9485eb23f94c979be9c588567b981722963591d3c0d5c0c29b7884e9d917c23b1ddc88f600996b3c790f306feadddb2ebe0ab7a686e15f9e49246ddb025fe63a85ca63c03c6acbdc1a97896837f0eb88d3988b618ea7b1e9bf65bebccaf226bca69dac6596cc6ea38e6fae0a7113456ee2d309944bfec24ae2bb9dff9a527959902b9c72efe9861", 0xd4}, {&(0x7f0000000c00)="508d0d27cc134561cf63bda1934dd98cc7eefb9b04982b6281a02fc2fc5bd29439779f48c01b6f192cfb", 0x2a}, {&(0x7f0000000c40)="fb33126969e2af3328ee17c68fe826f21bec893a928cdeda42937a19dc9686ce4440d7f340908e360a376c3612dc52cda2d89b7c82c2e67dfad4bb43a224dab56bce4e930be4", 0x46}, {&(0x7f0000000cc0)="9455795df5842261da7fb37943f8ae057a33198d319e8dd18b391e6ce176ec37503dd5570c2655625990dc94fc7991d422659b06529a68e9ea0b0eb83dbf63f9826452516f1f8b49d057c46f12bf5bb1460055b91d97a44aede5f44db870e9d19b8c267b7078edd6d771e0c711dd76c52bf4a48af4b25eb3acf1e170c4378d56177a42920b10e2b70b5a46923c05a48c08d38f972da459e9b35cc2159d6ae22fd3d62d6052930757ecc900588238a89c3997b1ea", 0xb4}], 0x6, &(0x7f0000000e80)=[@prinfo={0x18, 0x84, 0x5, {0x10, 0x7fff}}, @init={0x18, 0x84, 0x0, {0x3, 0x2, 0x8b7c}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x5}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x6}}, @sndrcv={0x30, 0x84, 0x1, {0xbf4b, 0x7, 0x2, 0xf732, 0x101, 0x3, 0xff, 0xf036, r4}}], 0xa8, 0x4}, {&(0x7f0000000f40)=@in={0x2, 0x4e23, @rand_addr=0x6}, 0x10, &(0x7f0000001080)=[{&(0x7f0000000f80)="0f0663972786b42d9a45af3c3967501cacb96c5518409f8c78a40ff93fe983965541a2734caece2a9a4d2ab8c833d77ca2a45f250f7144348f548dbb55ae20a87aeea6b2f08f4e76226d0191e2b0a804f474fde90a6b91a0ae0032", 0x5b}, {&(0x7f0000001000)="43eb6602614adf412356f71cb889ee18db702efdb3d796b07aed031276fff01db1fb75038e9ba4cf81d4abbc10a4746f39c6298144b794240c6f2fdb500113c43f841ab1686332a120d59ec2a79b5ccb44c3909c45fb", 0x56}], 0x2, 0x0, 0x0, 0x4000000}, {&(0x7f00000010c0)=@in6={0xa, 0x4e20, 0x80000001, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c, &(0x7f0000001180)=[{&(0x7f0000001100)="64212bf774235765ba7d1985e6f587fd9b955c9f02d7296bb3de759a43faf44300af7059ec246aa0184aefc130f33034da9448233b3a1fc6dd55f6a30bc404e12e9a29992eeb737d873820ce5b384e91f3d7298670881068e17bc0df2e24bb62eb8a0010d45a2cdffc34", 0x6a}], 0x1, &(0x7f00000011c0)=[@init={0x18, 0x84, 0x0, {0x8001, 0xfc, 0x8, 0x9}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x5}}, @init={0x18, 0x84, 0x0, {0x2, 0x5, 0x0, 0x58f}}], 0x48, 0x4040001}, {&(0x7f0000001240)=@in={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000001440)=[{&(0x7f0000001280)="49d12ab0fb38aee0984069986dce0d2a78d00c03047199d5fbae5e4b1b7c66465398d62851af77de800d797b2d8bd67374c4aa1c957d7141d97e4bd7556ea8304a67658d5ca449e7d31a2ac994795f12128d7273cdc893a3ffd04599e29fdb805a4a21adbf575cbd0df7612b8b8ee79834b686c4a995bbf2dfa7d614bec20143fc344d3a0e46962627fe", 0x8a}, {&(0x7f0000001340)="5c7a93377b163f69d4b6437ae297fa17eb3b2e2c9e67edff9b329ad2add399db513ba2486d46f0ad0e31d0892c035790f5fc203b1f5be9f61fe10bbb346d7cedba1ae302f8a9a49061ee4171818a432ad8c6350566c24c5a514c7112dcdc336da62c7e05e3dc1d46", 0x68}, {&(0x7f00000013c0)="caaa8e4bfd54d5e5ff59df297b2c541802e084738f7b1ee5f6da71d8b12e7c8536dc2bcf9bcf19ec6c9c26041fbdfb88eed71f8d48cf54fcf6ce86d93ac8af67fc3109ef7ebc267b43f59956d8a522e5b01245745899263d5556d795", 0x5c}], 0x3, 0x0, 0x0, 0x80}], 0x5, 0x8000) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r5, &(0x7f00000040c0), 0x1000) read$FUSE(r5, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r5, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r5, &(0x7f00000001c0)=ANY=[@ANYBLOB="10d7da2d65ab063680eb623a2115e36e110a3ee44ed12d97000020715ba5a3c7bfb0002b8ca4fb92cf24be505570a0b9865db440d3308a381ddce2bfd5e79b760a8afc4ad9b25d3930f5d03014f7cbe32bbf489b371f1178000000006b739ec9157f9c6e210cdd000000"], 0x10) 12:52:15 executing program 2: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x200000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x400, 0x25) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x10400, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x3a, @broadcast, 0x4e22, 0x3, 'lblc\x00', 0x8, 0x0, 0x1c}, 0x2c) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000001c0)={0x21, 0x3, 0x0, {0x3}}, 0x21) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x10400, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) [ 327.643449] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value 12:52:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, 0x0, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000c40)={r2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r6, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r6, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r4, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r7, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r6, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r9, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r10, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r10, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x10400, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) [ 327.857440] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value 12:52:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) [ 328.084693] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value 12:52:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f0000000880), 0xffffffffffffff81) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) [ 328.269712] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value 12:52:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) [ 328.449482] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value 12:52:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) [ 328.644162] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value 12:52:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bond0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000001c0)={@ipv4={[], [], @rand_addr=0x6}, r2}, 0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x3, r3) 12:52:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r1, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x7) accept(r1, 0x0, &(0x7f0000000080)) 12:52:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f00000004c0)={0x10, 0x1000, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000002c0)={&(0x7f00000003c0)=""/255, 0x1106000, 0x1800}, 0x18) r2 = accept4(0xffffffffffffff9c, &(0x7f00000001c0)=@ethernet={0x0, @remote}, &(0x7f00000000c0)=0x80, 0x80000) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000140)=0x3f, 0x2) 12:52:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180), 0x0, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) [ 329.521565] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value 12:52:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d7f5c33d72434a41ab662dc6e694fd7d9441ffe5c3406decc1505499d247d4512b7397c69a8be9e20ebbcde768f2b4f089227fbd0d9c949aff0ed5917220a6a20ff75b484a199d0a68c2c9869c1676ca8e33fd2cf64c6739e2c5f7b1cc7c5e82ae59e651b94ddd71d04eaaa36331022caa4355cbf8ed932859b7aeeb890c429e53d544100fe72b7d44db8a2f41b8c7ae61cac9793a73e7fb8705199a11972ab74532042ffd406b92b5282395e205dd04bf9bef322c81c", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10000000000000000000010000000000"], 0x10) [ 329.579563] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value 12:52:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x2, 0x200) r2 = accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000140)={r2}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000140), 0x4) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="ac220ade9722303c", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000140)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000280)={0x0, 0x0, 0x3}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000002c0)={r2, r3}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10000000000000924700000000000000"], 0x10) 12:52:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x8080, 0x0) write$P9_RREADDIR(r1, &(0x7f00000001c0)={0x49, 0x29, 0x400, {0x3, [{{0x40, 0x4, 0x6}, 0x80000001, 0x2, 0x7, './file2'}, {{0x80, 0x3, 0x8}, 0x401, 0x77d, 0x7, './file1'}]}}, 0x49) rmdir(&(0x7f00000000c0)='./file1\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000000000000300000000000000990299be75b3590047108633"], 0x10) 12:52:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000003c0)={'tunl0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000000700)={@mcast2, 0x0}, &(0x7f0000000740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000880)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f0000000ac0)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000c80)={&(0x7f0000000280), 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x11c, r1, 0x20, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0xb4, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffff000}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}]}}]}, 0x11c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r7 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x5, 0x101000) ioctl$DRM_IOCTL_MODE_SETCRTC(r7, 0xc06864a2, &(0x7f00000001c0)={&(0x7f0000000140)=[0xffffffff, 0x6, 0x0, 0xffff, 0x2, 0x4], 0x6, 0x1, 0x5, 0x81, 0x0, 0x4, {0x1d, 0x81cd, 0x1, 0x3f, 0x1000, 0xb6, 0xfffffffffffffff8, 0x1, 0x7, 0x81, 0x3, 0xd6, 0x100, 0x0, "cf458431c32fec41f0d2b78f7bcf7bf21b28b7f4b352dd799a12988d8a3d1441"}}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r6, &(0x7f00000040c0), 0x1000) read$FUSE(r6, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r6, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r6, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x8, 0x8}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x40, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000240)=0x5, 0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{0x0}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180), 0x0, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) epoll_create(0x54) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="4703fc0367ef39e8b82b17476b049ee338adddc3b20c0dc03568e880a20679f29daee3db183e0ce6582d8cc3727ff06d28fb3be9a3bd3fc8191b4a7f59b8014a9dc21bc8e447dc2d7593f189c556257e573931be5ad77fa79965a210ce3e19f56cc89e7062677be456f8288c87b6a7975c2d0f5b8290600208f6c8ce0ea8020246c357480b90"]) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 330.352848] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value 12:52:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair(0x8, 0x1, 0x1, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0x5) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f00000002c0)={0xdc27d1f05a2aad45, 0x0, 0x2}, 0xffffffd7) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$TIOCSBRK(r2, 0x5427) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="100d0000000000000000000000000000403646ebd77704d0cbf7071b228db80a4e681865f24baca74b55ddb523d09faa024c444592ac5092b82b92e312c3522a673d7e7ab7e75ebfae32a5218ef68c94d18f1c55396ba3e9f0407e1ae67ee2aeefa6c0598f657105e29ea1c117fbc93616276c7c971340cd70a493ce50bbdc187d3f1c3d1142276bb8c516e6e0c17f3f"], 0x10) 12:52:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group\b\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',allow_other,blksize=0x0000000000000400,allow_other,\x00']) r1 = dup2(r0, 0xffffffffffffffff) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) dup3(r1, r1, 0x80000) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="70656375726974792e2b24242b6d643573756d6370757365745d260021177c4ab63c7c1960abd0a3d5d10ddb853b95c239d33c8c606908528c9754e86f4e56d8a48ccff122bed145fc493e2f7ac640a590c2211636c3c049887faf8ffc61666601cb08314f9ff25993677784cc17242b437e729ce7acac41e2ad140bc2c71fa9ea60d60cb9bbbf643475f470cbc39a802912663a151a8d0d2cec9332a0ae9b2064467717cae1c32e74f68c8affb30e1262dc85852b54ef1cf173a125a5855a388f895f983604912469e66fc2ed3569398b3cf17c4d"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x5}, 0x34f) write$FUSE_DIRENTPLUS(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="100000ea0000000004000050bf1307de642b2c0ac31cd5bff84ea3926daaa0bebef5bb652f2fd748c173762c8f63c62612559ad27977b22664f08631110351b07f09"], 0x42) 12:52:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="70656375726974792e2b24242b6d640273756d6370757365745de2d0d77a3b4a647e70d4410e9f2600"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0x9d902b2b8641649e) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x2, 0x200) r2 = accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000140)={r2}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 331.205490] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value 12:52:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000140)={0xfffffffffffffcb1}, 0x3b3) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f00000003c0)={[], 0x0, 0x7, 0xd2, 0x0, 0x7ff, 0x5000, 0x5000, [], 0x7}) 12:52:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x1, 0x4000) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x14) mkdirat$cgroup(r1, &(0x7f0000000140)='syz0\x00', 0x1ff) 12:52:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea", 0x40}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) [ 332.034601] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value 12:52:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) [ 332.126777] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value 12:52:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0x9d902b2b8641649e) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:20 executing program 5: mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) [ 332.183696] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value 12:52:20 executing program 5: mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:20 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:20 executing program 5: mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:20 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.metacopy\x00') read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106ee", 0x60}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:20 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x80000000, 0x4, &(0x7f0000000640)=[{&(0x7f00000003c0)="01fb5ff4dd9fbd96cf89a3275e515cacbd4b324c8ea17b5133487efeffc9d7bc37d9e85a56e9e71558da8a67d3d5fc7a3cd44fbd57920546fecbc95fda2e3f908762952ecf10ed8ac48024900a3e932f2360a11c0c9c02fc1cb97d872263e485dd616729a5ac94760521696af1a26a900b64aa49190efa3cc46dbd8f50d21ac0108aa6109b0f84edf05b1b263c9de374d61918c94e17bb0b3e491738525c08ed3ab8d91623af82aa5f702a", 0xab, 0x9}, {&(0x7f0000000480)="d5d9b60b7fecdbe79ca4c8b38a9a79cc8613c392a10b87052c3a1bb990232e707db06ed53966b06228151604015010da64347fa0842eadc0886581d58943814c92225484a50124fe89a668bf6e299278544b829f523b11f572b0b382697d66dd14dd34f9ddcfd9f7f55bec74373dd6c416352a8953162790663f7e3e81afe22567cbf594d4645f2f5a89958e6bdca2b0aff7d491d42a969f9169519c8c7cb0b42619a0e686be2ba041b3d1ed179685427aafa6d40af5559b610d282040e6ef901fec53aa372fe7768875c8fb7cd764e365442ed3850e5d8b", 0xd8, 0xb592}, {&(0x7f0000000280)="57c55c107e1f966223b6b42ebec0070f59379e43850d6aa91dd8493e27e3f013798941d4d9be67dc80616d33b62a9e9dd27ee52637", 0x35, 0x401}, {&(0x7f0000000580)="59fde45122c3b8057762c0fed5463941612b11aa2ecea71093c8a0f31789e6c7cdcb5388f189d9cef279cd6da90e0c9a863b4e15dff67d705f7adf689a05a3efa2a8097b07d593e5995dc3ed87d1ae0e6c9be4c1e13840db543bae8e850d39b49a6420ca70b59dd1bdaedb40ec9315d32c17675261e722f87736a7251afad80be2cd789088cfd7ad81057e478d780fa803b95e7c5647cec89f042e9ad4e1b78e0850", 0xa2, 0x9}], 0x40, &(0x7f00000006c0)={[{@errors_remount='errors=remount-ro'}], [{@smackfshat={'smackfshat', 0x3d, 'group_id'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@measure='measure'}]}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:20 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) [ 332.922843] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 12:52:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x0, 0x0, &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:21 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(0x0, 0x0, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x0, 0x0, &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:21 executing program 0: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)=""/120, 0x78) flock(0xffffffffffffffff, 0xf) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="6211"]) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="70656375e401388bedb6aef12b6d643573756d6370757365745d2620"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x600000, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x6) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000480)={0x2, 0x2, 0xffffffffffffff00, 0x80080010, {}, {0x3, 0x1, 0x6c, 0x10000, 0x4, 0x5, 'HM7j'}, 0x500000, 0x0, @planes=&(0x7f0000000440)={0x3, 0xb198, @fd, 0x3f}, 0x4}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000540)) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f00000002c0)={0x3, 0x1, [0x8, 0x3, 0x3, 0xfffffffffffffffc, 0x2, 0x70, 0x5, 0x1]}) ioctl$VIDIOC_ENUMOUTPUT(r2, 0xc0485630, &(0x7f00000001c0)={0x47, "65cbfb6493af6613e9b085606e8550897fc81bcc55b3531064068fd2c1201bae", 0x1, 0x2, 0x9, 0x0, 0x6}) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000280)={0x10, 0x0, 0x2}, 0x10) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000240)={0x9, 0x2a, 0x10, 0x8, 0x6, 0x0, 0x6, 0xd9}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) ioctl$VT_ACTIVATE(r1, 0x5606, 0x0) 12:52:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x0, 0x0, &(0x7f0000000180)='overlay\x00', 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.redirect\x00') read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79", 0x70}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:21 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006fc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) close(r0) 12:52:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x40000, 0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x1) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:22 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(0x0, 0x0, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 12:52:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c20000e7a9aaaaaaaaaa86dd60093a0600080600fe8000000000000000000000000000bbff02000000000000000000000000000100000000000890789ec7e7a55691962332bbcdd473417080cf9bd062ca5214112b0128a1edc71e5e9fdda1e840de062582ef262b30c45c4346d90fe3dc"], 0x0) 12:52:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10d8ec00000000020000000000000000"], 0x10) [ 334.115246] overlayfs: unrecognized mount option "rootcontext=staff_u" or missing value 12:52:22 executing program 1: lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_targets\x00') ioctl$KDGKBMODE(r0, 0x4b44, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002f40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/111, 0x6f}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40, 0x0) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 12:52:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0xd5e) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb42849", 0x78}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x0, 0x0) 12:52:22 executing program 1: lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_targets\x00') ioctl$KDGKBMODE(r0, 0x4b44, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002f40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/111, 0x6f}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40, 0x0) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 334.556717] overlayfs: missing 'lowerdir' 12:52:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x0, 0x0) 12:52:22 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x402000) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x40000000000002) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x80000, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r2, &(0x7f00000040c0), 0x1000) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x6, 0x4, [0x1, 0x6, 0x8, 0x34]}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r3, @in={{0x2, 0x4e21, @loopback}}, 0x1ff, 0x2}, 0x90) read$FUSE(r2, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r2, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:22 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000300)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "86059f", 0x44, 0x0, 0x0, @local, @mcast2, {[], @gre}}}}}, 0x0) [ 334.713299] overlayfs: missing 'lowerdir' 12:52:22 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) getrandom(&(0x7f00000003c0)=""/217, 0x3d6469dbc5bf6f21, 0x2000000000002) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000013) 12:52:22 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80, 0x0) read$FUSE(r0, &(0x7f0000000880), 0x1000) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYRES64=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000000)=0xb91f) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:22 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(0x0, 0x0, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="66c7dffd5834d2665a506435", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="7065637574792e2b2434c3242b6d643573756d6370757365745d"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000001440), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="10000000da31e877004ff57a0100000000000000ccb3e0bddf7c154d89882adbb959735cb861f26cb1daf50a4300508235ad0beecfd93f9376c317576d5da7d1275b3bc8dd119439474ece14df45ff605c6a65fc3ab047c6cead8384bc470534277e97386326cc4482265f264910bc0baf36f8ecc8482d520790160026465d6a13f6dd3e6f4f147f0eca1312c83bc84e59b215c321e7dbe19abec02bb71549f555e1fb84b3ea78495a316bfecda5f8d03d8789c9ff594e5794964029bf92afc75ca81e0453db21757241840f2b1f654c5324d7ea69a8d9bbaf0e0bf59f4e685ba39c034b63d699efc192f431206c398392e4a2756b7baf92e830b1be1cf8d36f28622b6f737e24c2e39ceddf03741566d839"], 0x10) 12:52:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x0, 0x0) 12:52:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1ff, 0x200001) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000140)=0x1) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 335.058047] overlayfs: missing 'lowerdir' 12:52:23 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x3) 12:52:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000202c0)='./file1\x00', 0x40000000000004) 12:52:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3", 0x7c}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="bcedf6dfb429fb42c60000040000000000000000efffffffffffff9252f10d19f28f6f8b424f257353adc0817605df450000e525c50c665cd0f5ed4c4453a537bc92cb29b43e0f7c89fc5ef4354b5f08e8f9402226e5f5a5895879d9cac066657c7561e7dc4f3b76feb26a7e6b183db54c989dd063f76df95b61001c678e", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x10000000000000, 0x4}, 0x10) 12:52:23 executing program 5: 12:52:23 executing program 1: 12:52:23 executing program 5: 12:52:23 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0), 0x0, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:23 executing program 5: 12:52:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0a5c2d023c1262857180") r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1, 0x3, 0xffffffffffffff92}) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000480)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) request_key(&(0x7f00000000c0)='logon\x00', 0x0, &(0x7f0000000040)="2264111518", 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:52:23 executing program 2: r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xcb, 0x103000) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f00000001c0)="28be38fdd66d0214e080ab0f8b9794d3833b209b7b8bc838db1f7fc87c7877de81c759f0e5cabd438a89439dce744a0aafb8a11d570e6452ab607ae836ae12dbd406660ed388f76576cba8345ef82c611ec409c3b0d3c5a6225d433affef5f5578053026a137c0769f2506b26aa42554cf20f2943db6d69d7cd0844807b1") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000080)={0x0, 0x5, 0x80000001, 0xaf55, 0x9, 0xfd4, 0x7, 0x10000}, &(0x7f00000002c0)={0xff, 0x3, 0xfff, 0x100000001, 0x0, 0x0, 0x2, 0x5}, &(0x7f0000000580)={0xfffffffffffff171, 0x4, 0x7fffffff, 0x101, 0x10001, 0x6, 0x3f, 0xff}, &(0x7f00000005c0)={0x0, 0x989680}, &(0x7f0000000640)={&(0x7f0000000600)={0x6}, 0x8}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="008c0d85eb0486cafaebb7ec2a072342970918ed07a7d8faac4861a13b8776d4ffac2f37e73b0d08fd83a5ad10442234298b5f0b0a7c5a8ea787d3891abd72e70085d74e625a0e4628871082b66fb3dc7f6431b32f14906ce5f105fbb772a3c344c14ebd59374d6bb98559222d322d97c67be300ef21469ac244667f29f3f8d02a445fa079fde701bc2c787daff4ce507e9f82affd4786864f0b5593101bc35920848d49d5cafdd4da8eb3137a65b82f3b5e45ec0ae104ed049a02ea080cf9ed54f1da3d02017c66aeaa820ef4acea3ceebe957f1726f29a9fee", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x0, 0x9}, {0x26b, 0x4}, 0x100000000, 0x6, 0x2dc}) sync_file_range(r0, 0x100000000, 0x3, 0x4) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="b73d5b9df2697412cd018000006d643573756d636c757365745d26005d595301578d5803c415234637ff9475d84ab8e4404595e6bdac558b0f3ba1c6841566b0fc7c83da4a1a659346f352b762cc6754779539a217972986e6de0500ae26147fb3c1894fec6980656ba25b387ec35d23ec12b0d4b7f59639c63895730b381f97478b5d2672b558c22a5dba01ea5cd60007adf8d1dff5a0c623779b7ac07ea69302ff14b8feaf1b39da867f234a8241373c87a6c46f364c58a8bcf84c869ee4319b43d743d9f75aa75e87578a7c3f7b17ce7c74369a72776facd7f6188d6d045fcdff775cbd059053c8f53b801fff76fa1b53aef2d88a3aa6eb131c977781a109020000000000000005cedc9703000000b1af2932545fad6be9e8b855f2d5f65cb8eedccd822664225fac903040e7254ea25b60668cca9f00ae5dcdd316b8951e7005bc00005bc3fff6ed768ab2e43a6a11ae691403ef7d7f1a231360ea78503c2100baf70972baa5ce505f3af803c5525b550eaa711f26000319df38eea756cf6210f51e1799"]) read$FUSE(r1, &(0x7f0000001880), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r2 = geteuid() getgroups(0x7, &(0x7f0000000280)=[0x0, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xee00, 0xee00]) chown(&(0x7f0000000140)='./file0\x00', r2, r3) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="1000000000000000040000000000000082c389c9454b9e917e1a594a611ed74352deeb39ed3b9cc6f08b17d3475829f0dff0f155b849aa9ad70c9e15de7edd16fde61810d94b65b6d6392f87a2742705054cf4a67f561897252914799a1e577b689fd5c386a8769a109b4d373682b39563b3b1da42650a1b65374b0646968cb718e5e3911b3083bbda2e771e50f66b86142ef37c1dc112f3d53d94968148fd"], 0x10) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000340)) fstat(r1, &(0x7f0000000400)) 12:52:23 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") 12:52:23 executing program 1: 12:52:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d", 0x7e}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:24 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x5, 0x400000) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x80, &(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYPTR64=&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYPTR, @ANYPTR64], @ANYRESHEX=r1, @ANYBLOB="73e4d7e72d6726119b3d4d78dba1d0b35c5948e52206a67fe7c6ae2b498ab85f518b16f8c5a8", @ANYRESDEC, @ANYRES16=r1, @ANYRES32=r1], @ANYRESHEX=r1, @ANYRESOCT=r1, @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69641af43d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="10b43d0ffc8f0a12a4c9fe0000000000"], 0x10) 12:52:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x280000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e20, @local}}, 0x4e8, 0x8, 0x3, 0x10000, 0x34}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x3, 0x0, 0x6, 0x8, 0x6}, &(0x7f0000000200)=0x14) 12:52:24 executing program 5: 12:52:24 executing program 1: 12:52:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10d680053dae6525d6dc27dda92ce7cfe5584ada524bf51e2d9f8ef5ce82f4f2abba89376a4d4cba5b62da674467f5e2fc6efa3410117cb5b2bc7e29c7ebc0c41bf63eee9981b121fef6eb82d17961f69f"]) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x8, 0x70400) accept$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:24 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0), 0x0, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:24 executing program 5: 12:52:24 executing program 1: 12:52:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f00000003c0)={0x1, @output={0x1000, 0x0, {0x8, 0x2}, 0x100000000, 0x1445}}) 12:52:24 executing program 1: 12:52:24 executing program 5: 12:52:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:25 executing program 1: 12:52:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:25 executing program 5: 12:52:25 executing program 1: 12:52:25 executing program 5: 12:52:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0), 0x0, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:25 executing program 1: 12:52:25 executing program 5: 12:52:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f00000001c0)=0x100, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="705494e0d2fcae14b2bbf301656375726974792e2b24242b6d643573756d6370757365745d2600"]) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="10000000d4f12d9d03e500000000000051b658fe3d"], 0x10) 12:52:25 executing program 1: 12:52:25 executing program 5: 12:52:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:26 executing program 1: 12:52:26 executing program 5: 12:52:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='/dev/kvm\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x2000, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="100000f5920000000400000000000000"], 0x10) 12:52:26 executing program 1: 12:52:26 executing program 1: 12:52:26 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:26 executing program 5: 12:52:26 executing program 1: 12:52:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) getitimer(0x1, &(0x7f00000000c0)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:26 executing program 1: 12:52:26 executing program 5: 12:52:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:27 executing program 1: 12:52:27 executing program 5: 12:52:27 executing program 5: 12:52:27 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x40, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x8000, 0x0) mkdirat(r1, &(0x7f0000000280)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="6d656375726974792e2b24242b6d643573756d638c737365745d2600"]) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r2, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) sendmmsg$alg(r0, &(0x7f0000001d00)=[{0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000500)="b19646687f3b26061ffb4ff8575b8d5d72fe1f486164c01bfec04161b3f20c603186a86ac13643205000386d82a3b40e5e925666768019c7acc8509884647b6a7ee57c6d4880815e6f3d89b592420492f8e177a2877bbb36ef33cd2d62cfc84f073074791e27d1b5cdfa4ce33c120aad26de69032c3ebc3ff55614389b3411c714b82bb2fc726b7e4b1e4da982a9039c3c2726e77293b3072fc8182a3b9c74cd61852c63ac873d738c88b356da8693cc1fd89408bc0e9829eeb2f939a87a5636191b82ae51a6f15414622aa044ac9ddbc9697f3d622fdc3b", 0xd8}, {&(0x7f0000000000)="f1c7fc819a88f16cd26ef3d8cacab335629576af4481097c6ea27f91ce286b56ba0278bd4adc5bc885f690723ffada30", 0x30}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="c06a43e25bd4324c6f118fe5394acb2bce71b928268db44750f48d87d6ed426d4e8528673de0b2941efe65f16f855dbb67cf0565630c8cbe949616fc012937b16bbba5802358ed2a9a2a922ce2faf65d6b7ae54c541666435afec43fe899771b8ad43281200aa615ec51b626977a0fb059126e910bd842753fca2033e1b30eaebd3c30da08ea242c0828316c6bfb75c6ca422ef61f21db2894724eff5fa46db4a7f501", 0xa3}, {&(0x7f00000016c0)="6c1b4bb7618a3c2aa64819ea4e59f3db2313246c7146fd5e36c0e2c55997320a13e2a252341e05f7070b306d2234242b1de31298a22fe56aeea3f0e5bdd479f3961e90bbc020d3694c45dbd0c74cd3c142a9e2e98c3cbcef5e81c9f0521c2934ac6f5e997375427755365a47eb479a7364a0d3a6bb7cffc662a0", 0x7a}, {&(0x7f0000001740)="23b8c9abfc7956b366a05ce32427326ded9c75865c2e938eab10d967781124078b572e0bcf13b71e3e04807d209627ad96211162f504e90033c352f082bca31ef927730e53a3c1f8c7d20112bd15b866108a1e41783d70c5d188378e67840a63caaf9e844e1de3fb5e64e3809d58bf248418c7ea1ab0af4733ba153c265b59d9325d394edce126d856f9a777a49887530d7d40dda6dfb70941cae53beb88996bc831237b2ab201190cde2df65d70739b23cb54b8a8ffadd262bbfe32eb62cfe35d", 0xc1}, {&(0x7f0000001840)="2c24f0ea8f638802a234ab125aa3f1c67f3b28cfcdcf8c7dcc0029281f408016ef278646b3af1c95e0d751895ee83531918030033744f8ba28847561a78d19b5d90fad9b618ad56f76321118a5c00a69e9808999eccf1cdbd89567fb91b16b61d2b1050621971de3ad141f34c7c02a39c79dd95b0131aa243e8ad90a086a545dd20693cf3a7e8f7dbef475cc", 0x8c}, {&(0x7f0000001900)="bb5f473048ceb5156e60433e20a3f13cb25f76a2613557e5f2f5378a70c6d63b5d18e533dffd889c94eb58fe3f47dc05f2854543dc292db172a8a040a52e48c47da8dba666c0f070c30278ca0873182455caf896dea0bbd99594fdf62a76a07399baf5d235fbc0ecdcb39aa14da30eef80c1d031193d5e30c4fc2d90c6027ec97f219f72f04a33d03daa98369b42d50f0d11369db30cf876d496b64f821bfb64943a5b98cc4412e6dd78a630e8bc68fb18d4e3b54f092e4c04eb95a6a986d3abfdc771b2dc81cb7879605cf0e592995628f9a541a96d561c62b6a8", 0xdb}], 0x8, &(0x7f0000001a80)=[@iv={0x30, 0x117, 0x2, 0x15, "43bc3e41c210f59eac9e663c5dfb6d999860104f9e"}, @assoc={0x18, 0x117, 0x4, 0x2}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x4}, @op={0x18}], 0x90, 0x4000000}, {0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001b40)="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", 0xfa}, {&(0x7f0000001c40)="03de15239aa47056620a505c598e781c58bd4fe766060772cffd8e42de277a494be6f925e690f26c72234e06d6f22ea9a84a2b05a28ea24346041c0fffb5b711028a3d80f52ff9db29a41804c0a85cb75f51b2a3234f30637217da82ccd044b912359bf4bf4cca4078a40f279715723da7e97deeba36732be233b307016c5d7d50754d419285c643f860fb350be8ba768207ae39b95ab4adeda03a5f5c3cd87caf82a7e09b5787", 0xa7}], 0x2, 0x0, 0x0, 0x4000000}], 0x2, 0x800) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x10) 12:52:27 executing program 1: 12:52:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:27 executing program 5: 12:52:27 executing program 1: 12:52:27 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x80000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0xfffffefffffffffc, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x80400) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x100000000, 0x30b9, 0x4, 0xa60}, 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) sendto$inet(r1, &(0x7f00000001c0)="bb94cb54aa1cfc10cee17c89bd03668d2e2b5a972e95cad426dd9ec2282916271845180a6e3867c87a2db28d4e02424786603481220fd25a91e5bc80871179417e6ca08f9a28386be610dc8e8e1b5c81177cfbe3089598eabf1ab70c5010df6acda111c7cfea9677", 0x68, 0x20044840, &(0x7f0000000280)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:27 executing program 5: 12:52:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) socketpair(0xa, 0xa, 0x9, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f00000006c0), 0x4) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x3, 0x20800) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f00000001c0)) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x7fff, 0x40, 0x5, 0x0, 0x1, 0x9}}, 0x50) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000140)={0x2a, 0x3, 0x0, {0x1, 0x9, 0x0, '!([eth1&#'}}, 0x2a) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:27 executing program 1: 12:52:27 executing program 0: 12:52:27 executing program 5: 12:52:28 executing program 0: 12:52:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:28 executing program 1: 12:52:28 executing program 5: 12:52:28 executing program 0: 12:52:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xc7, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r2 = geteuid() r3 = getegid() getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280)) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x10, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@fowner_gt={'fowner>', r4}}, {@appraise='appraise'}, {@uid_eq={'uid', 0x3d, r5}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@smackfsroot={'smackfsroot', 0x3d, '+$$+md5sumcpuset]&\x00'}}, {@appraise='appraise'}, {@obj_role={'obj_role', 0x3d, ',ppp0'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, "28657468317070703125262fef40656d3128"}}]}}) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) sync() write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:28 executing program 5: 12:52:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:28 executing program 0: 12:52:28 executing program 1: 12:52:28 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x3f) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) socket$inet_dccp(0x2, 0x6, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x2c3a0000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 12:52:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x8fc, &(0x7f0000ffc000/0x4000)=nil) 12:52:28 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x8480020}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') sendfile(r0, r1, 0x0, 0x80000002) 12:52:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x40045436, 0x0) 12:52:29 executing program 5: syz_open_procfs(0x0, 0x0) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 12:52:29 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x8480020}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') sendfile(r0, r1, 0x0, 0x80000002) 12:52:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x189200, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000140)=0x8, 0x4) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0xf6}}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read'}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}]}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.nlink\x00') read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0, &(0x7f0000000280)=0x0) r4 = getgid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000880)={0x528, 0x0, 0x4, [{{0x0, 0x3, 0x8b2, 0x7, 0xff, 0x8, {0x5, 0xfff, 0x10000, 0x6, 0x8, 0x2, 0x100, 0x7, 0xaf39, 0x162e89d4, 0x5, r3, r4, 0xbd, 0xb226}}, {0x5, 0x5f2, 0xc, 0x9e7, 'cpuset:ppp1*'}}, {{0x5, 0x2, 0x0, 0x6, 0xfff, 0x1, {0x2, 0x8, 0x0, 0x10000, 0x9, 0x8, 0x100, 0x9, 0x2, 0x3, 0x1, r2, r4, 0x17}}, {0x6, 0x96f, 0x0, 0x6}}, {{0x6, 0x0, 0x8, 0x4, 0x6, 0x1, {0x0, 0xfff, 0x6967, 0x9, 0x3a28, 0x322e, 0x3, 0x8, 0xfffffffffffffffb, 0x8, 0x9, r3, r4, 0x5, 0x1f}}, {0x6, 0xff, 0x7, 0x9, 'blksize'}}, {{0x1, 0x3, 0x100000000, 0x5, 0x800, 0x7fffffff, {0x4, 0x20, 0x8, 0x4, 0x401, 0x2, 0x2, 0x101, 0x400, 0x100000001, 0x0, r1, r4, 0x1, 0x9}}, {0x0, 0x76, 0x1, 0x4, '\''}}, {{0x4, 0x1, 0x2, 0x9, 0xd5e, 0x7, {0x6, 0x20, 0x4, 0x0, 0x5, 0x5, 0x8001, 0x1ff, 0x80000001, 0x3f, 0x1, r2, r4, 0x1, 0x7fff}}, {0x6, 0x1f, 0x5, 0x80000000, 'fuse\x00'}}, {{0x1, 0x2, 0x4, 0x86, 0x8000, 0x6, {0x3, 0x9, 0x8, 0x9, 0x5, 0x7, 0x5, 0x0, 0xc7, 0x4, 0x3, r1, r5, 0x743d, 0x2}}, {0x3, 0x40, 0xa, 0x7, 'wlan1$bdev'}}, {{0x3, 0x2, 0xfffffffffffffff9, 0x5, 0x5, 0x0, {0x6, 0x5, 0x8, 0x8000000000000000, 0x0, 0x3, 0x1, 0x7f, 0x80, 0x1f, 0x3, r1, r5, 0xff, 0x7}}, {0x0, 0x4, 0xa, 0x7, '/dev/fuse\x00'}}, {{0x5, 0x0, 0x1000, 0xd9, 0x0, 0x400, {0x1, 0x5, 0x80, 0x8b, 0xfff, 0x400, 0xd8f, 0x101, 0x6, 0xd1bf, 0x17b, r3, r4, 0x3, 0x8}}, {0x2, 0x1ff, 0xb, 0x800, 'allow_other'}}]}, 0x528) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000000c0)) 12:52:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x4300, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000140)=0x2, 0x4) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3ff}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000640)={r3, 0xffffffffffffffff, 0x10, 0x7ff, 0x8}, &(0x7f0000000680)=0x18) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000800)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x28, r4, 0x820, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0xcd8b580a1c588430}, 0x40000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 341.896900] jfs: Unrecognized mount option "permit_directio" or missing value [ 341.992797] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video2\x00', 0x2, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="7065637572697d792e2b1c242b6d643573756d6370757365745d2600"]) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x8000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000480)=[@in={0x2, 0x4e20, @rand_addr=0xfffffffffffffffc}, @in6={0xa, 0x4e24, 0x5, @mcast1, 0x8}, @in6={0xa, 0x4e20, 0x9, @empty, 0x1}], 0x48) sendfile(r1, r1, &(0x7f0000000140), 0xbff) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="10000000000000000400000000020000838e7c30918aee076a475dfdac9362265d16669a30818323cb543b630474ebc301cd4f33719911222a97924af67dbd66ffc0c6e4a9ac8d681a2dccceb13a209d8b1dc3458a005e035403cb6703460a32e83d926fd463f9a4f236808755d48d0253a14366492ad096fa57969e"], 0x10) 12:52:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3ff}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000640)={r3, 0xffffffffffffffff, 0x10, 0x7ff, 0x8}, &(0x7f0000000680)=0x18) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000800)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x28, r4, 0x820, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0xcd8b580a1c588430}, 0x40000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 342.354386] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3ff}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000640)={r3, 0xffffffffffffffff, 0x10, 0x7ff, 0x8}, &(0x7f0000000680)=0x18) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000800)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x28, r4, 0x820, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0xcd8b580a1c588430}, 0x40000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d", 0x7e}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) [ 342.593610] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3ff}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000640)={r3, 0xffffffffffffffff, 0x10, 0x7ff, 0x8}, &(0x7f0000000680)=0x18) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000800)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x28, r4, 0x820, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0xcd8b580a1c588430}, 0x40000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 342.821509] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3ff}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000640)={r3, 0xffffffffffffffff, 0x10, 0x7ff, 0x8}, &(0x7f0000000680)=0x18) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000800)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x28, r4, 0x820, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0xcd8b580a1c588430}, 0x40000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000280)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f00000002c0)={0x0, 0x9, 0x0, 0x5b, &(0x7f0000ffa000/0x4000)=nil}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="1000368b47d11e910300000100000000000000f78a03f936318760d6ebeb0d39484a339f885ab7b2601e3f9ebfa319bf07d89752f1a0d15800bfb036e6ec4341000000000000287407e718801e0595e5e145c3d4c05fdf"], 0x10) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f00000001c0)={r3, &(0x7f00000003c0)=""/200}) 12:52:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) [ 343.107137] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106ee", 0x60}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3ff}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000640)={r3, 0xffffffffffffffff, 0x10, 0x7ff, 0x8}, &(0x7f0000000680)=0x18) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000800)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x28, r4, 0x820, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0xcd8b580a1c588430}, 0x40000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) 12:52:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a045018"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106ee", 0x60}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) [ 343.951927] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0x79f) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x40000, &(0x7f00000003c0)={[{@nfs_export_off='nfs_export=off'}, {@index_on='index=on'}, {@xino_off='xino=off'}, {@xino_auto='xino=auto'}, {@xino_auto='xino=auto'}, {@xino_auto='xino=auto'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@xino_off='xino=off'}], [{@dont_measure='dont_measure'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@fsname={'fsname', 0x3d, 'fuse\x00'}}, {@appraise='appraise'}]}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) fsetxattr$security_evm(r0, &(0x7f00000002c0)='security.evm\x00', &(0x7f0000000480)=@ng={0x4, 0x0, "b5e9ea"}, 0x324, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x800, 0x2) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f00000001c0)=""/83) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106ee", 0x60}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3ff}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000640)={r3, 0xffffffffffffffff, 0x10, 0x7ff, 0x8}, &(0x7f0000000680)=0x18) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000800)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x28, r4, 0x820, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0xcd8b580a1c588430}, 0x40000) 12:52:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a045018"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) [ 344.829641] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x3a, @broadcast, 0x4e22, 0x3, 'lblc\x00', 0x8, 0x0, 0x1c}, 0x2c) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000001c0)={0x21, 0x3, 0x0, {0x3}}, 0x21) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000c40)={r2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r6, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r6, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r4, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r7, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r6, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r9, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r10, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r10, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3ff}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000640)={r2, 0xffffffffffffffff, 0x10, 0x7ff, 0x8}, &(0x7f0000000680)=0x18) read$FUSE(r0, &(0x7f00000040c0), 0x1000) syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00') 12:52:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) [ 345.715634] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:33 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000340)={'broute\x00', 0x0, 0x4, 0x69, [], 0xa, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)=""/105}, &(0x7f0000000000)=0x78) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000040)=0x106, 0x4) sendto$inet6(r2, &(0x7f00000001c0)="03004e0007000000fffffffafff55b4202938207d9fb3780", 0x18, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x20000000005, @local}, 0x1c) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) [ 345.975687] skbuff: bad partial csum: csum=0/65535 headroom=146 headlen=14 12:52:34 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000340)={'broute\x00', 0x0, 0x4, 0x69, [], 0xa, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)=""/105}, &(0x7f0000000000)=0x78) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000040)=0x106, 0x4) sendto$inet6(r2, &(0x7f00000001c0)="03004e0007000000fffffffafff55b4202938207d9fb3780", 0x18, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x20000000005, @local}, 0x1c) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:34 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000340)={'broute\x00', 0x0, 0x4, 0x69, [], 0xa, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)=""/105}, &(0x7f0000000000)=0x78) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000040)=0x106, 0x4) sendto$inet6(r2, &(0x7f00000001c0)="03004e0007000000fffffffafff55b4202938207d9fb3780", 0x18, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x20000000005, @local}, 0x1c) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) [ 346.102531] skbuff: bad partial csum: csum=0/65535 headroom=146 headlen=14 12:52:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x3a, @broadcast, 0x4e22, 0x3, 'lblc\x00', 0x8, 0x0, 0x1c}, 0x2c) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000001c0)={0x21, 0x3, 0x0, {0x3}}, 0x21) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 346.229791] skbuff: bad partial csum: csum=0/65535 headroom=146 headlen=14 12:52:34 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000340)={'broute\x00', 0x0, 0x4, 0x69, [], 0xa, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)=""/105}, &(0x7f0000000000)=0x78) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000040)=0x106, 0x4) sendto$inet6(r2, &(0x7f00000001c0)="03004e0007000000fffffffafff55b4202938207d9fb3780", 0x18, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x20000000005, @local}, 0x1c) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) [ 346.398912] skbuff: bad partial csum: csum=0/65535 headroom=146 headlen=14 12:52:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3ff}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000640)={r2, 0xffffffffffffffff, 0x10, 0x7ff, 0x8}, &(0x7f0000000680)=0x18) read$FUSE(r0, &(0x7f00000040c0), 0x1000) 12:52:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000001c0)=0xc) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f00000000c0)='./file0\x00', r1, r2) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="100000000700000000007f69a025cc99"], 0x10) 12:52:34 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000340)={'broute\x00', 0x0, 0x4, 0x69, [], 0xa, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)=""/105}, &(0x7f0000000000)=0x78) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000040)=0x106, 0x4) sendto$inet6(r2, &(0x7f00000001c0)="03004e0007000000fffffffafff55b4202938207d9fb3780", 0x18, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x20000000005, @local}, 0x1c) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) [ 346.600184] skbuff: bad partial csum: csum=0/65535 headroom=146 headlen=14 [ 346.612278] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:34 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000340)={'broute\x00', 0x0, 0x4, 0x69, [], 0xa, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)=""/105}, &(0x7f0000000000)=0x78) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000040)=0x106, 0x4) sendto$inet6(r2, &(0x7f00000001c0)="03004e0007000000fffffffafff55b4202938207d9fb3780", 0x18, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x20000000005, @local}, 0x1c) [ 346.744242] skbuff: bad partial csum: csum=0/65535 headroom=146 headlen=14 12:52:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_create1(0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3ff}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000640)={r2, 0xffffffffffffffff, 0x10, 0x7ff, 0x8}, &(0x7f0000000680)=0x18) 12:52:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:35 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000340)={'broute\x00', 0x0, 0x4, 0x69, [], 0xa, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)=""/105}, &(0x7f0000000000)=0x78) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000040)=0x106, 0x4) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) [ 347.491296] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:35 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000340)={'broute\x00', 0x0, 0x4, 0x69, [], 0xa, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)=""/105}, &(0x7f0000000000)=0x78) socket$packet(0x11, 0x3, 0x300) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:35 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000340)={'broute\x00', 0x0, 0x4, 0x69, [], 0xa, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)=""/105}, &(0x7f0000000000)=0x78) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:35 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:36 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) socket$inet6(0xa, 0x803, 0x3) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:36 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:36 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) socket$inet6(0xa, 0x803, 0x3) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:36 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) pipe(&(0x7f0000000200)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3ff}, &(0x7f0000000600)=0x8) 12:52:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:36 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) socket$inet6(0xa, 0x803, 0x3) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:36 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) [ 348.422614] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:36 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:36 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:36 executing program 5: ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, &(0x7f0000000140)={0x0, @data}) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:36 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, 0x0, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000c40)={r2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r6, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r6, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r4, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r7, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r6, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r9, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r10, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r10, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:37 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) pipe(&(0x7f0000000200)) 12:52:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:37 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:37 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x0, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) [ 349.281952] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:37 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x0, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:37 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x0, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:37 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:37 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000c40)={r2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r6, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r6, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r4, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r7, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r6, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r9, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r10, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r10, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:37 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) 12:52:38 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:38 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:38 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:38 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) [ 350.234241] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:38 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:38 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:38 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") 12:52:38 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x0, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0, 0x0, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 12:52:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) 12:52:39 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x0, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:39 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x0, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) [ 351.056691] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) [ 351.194233] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:39 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) [ 351.367018] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:39 executing program 1: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) 12:52:39 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") [ 351.592497] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:39 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:39 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) 12:52:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}], 0x7, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:39 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:39 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) 12:52:40 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:40 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) 12:52:40 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) 12:52:40 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:40 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") 12:52:40 executing program 1: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', 0x0, 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) 12:52:40 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c12") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:40 executing program 1: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', 0x0, 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) 12:52:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {0x0}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:40 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c12") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:40 executing program 1: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', 0x0, 0xfffffffffffffffc, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) 12:52:40 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c12") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:40 executing program 1: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f00000001c0)="e08d", 0x2, 0xfd}, {&(0x7f00000003c0)="7a0cba66d09036d5a7bbaabca9a8dc7054ac2add08a42c120783ede0a030b9f0b6fbfd94dcb5e967dbd4d295f271c02d9386ac3f76670cb67c7f20d49f624208e78102e36c07c1a19050a844d29938442c3cd24096a6adccf67ab5d22a9311bcaeaa6f0f625b6f8b57a4b97f699649a0f89265208367c98a4db43919850eeb2b2318bf1bf627d856b154e2d06e83beba55618c24041446375d320f", 0x9b, 0xfffffffffffffffa}, {&(0x7f0000000480)="f4e6f1ed32325342a0d9dedd0a49a4b0ec2ee91a5a4caf7b955705d05e9fb3d075140b075ac81ef7795d700075f1c60ae99a00fc26eb0d8802288b6e3225e4e1a8d85593494e95f67875ded7e8c1fd46148217ff9a14d93d453d6c748aa6c03dc2264ce381b7ff9dacf828610ee973973aa6ef240338704cddb44982d1df6d7999f87eea5771a82d35010c50cfb5c562e661d26a4afdcbfd6b0ff27fa3cecae8e273e639bba5cfd6fe52fb183e3b16ecd5c9eb1e29fef0e3c03ebc7722865c17f9d63402affa5c", 0xc7, 0x8}], 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) [ 352.945779] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:41 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c12628571") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:41 executing program 1: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) 12:52:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) [ 353.121892] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:41 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:41 executing program 1: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@grpquota='grpquota'}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}) 12:52:41 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c12628571") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) [ 353.281689] jfs: Unrecognized mount option "permit_directio" or missing value 12:52:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f0000000980)=""/116, 0x74}], 0x7, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:41 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c12628571") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:41 executing program 1: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:52:41 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:41 executing program 1: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:52:41 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c1262857180") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:41 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:42 executing program 1: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:52:42 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:42 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c1262857180") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {0x0}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:42 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:42 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:42 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c1262857180") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:42 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {0x0}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:42 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:42 executing program 0: ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:42 executing program 0: ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:43 executing program 0: ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x7, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:43 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:43 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {0x0}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:43 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, 0x0) 12:52:43 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:43 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:43 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:43 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x0, 0x0, 0x0, 0x0) listen(r0, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:44 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {0x0}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:44 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:44 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x0, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:44 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x0, 0x980914, 0xfdfd}) 12:52:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:44 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x0, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:44 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x0, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x0, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x7) accept(r0, 0x0, &(0x7f0000000080)) 12:52:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x7, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:45 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:45 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x0, 0xfdfd}) 12:52:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:45 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:45 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:45 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x0, 0x0, 0x0, 0x0) listen(r0, 0x0) accept(r0, 0x0, &(0x7f0000000080)) 12:52:45 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {0x0}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:46 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:46 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x0, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:46 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @data}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914}) 12:52:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:46 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x0, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:46 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x0, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:46 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:46 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x0, 0x0, 0x0, 0x0) listen(r0, 0x7) accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) 12:52:46 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x7, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:46 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) read$FUSE(r0, &(0x7f00000050c0), 0xfdfc) 12:52:47 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:47 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:47 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:47 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c12") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0, 0x0, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x723fb63a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000001d000), 0x0, 0x0, 0x0, 0x0) listen(r0, 0x7) accept(r0, 0x0, 0x0) 12:52:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:47 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c12") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {0x0}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x487, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x578) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x200}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 12:52:47 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c12") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) [ 359.919122] kasan: CONFIG_KASAN_INLINE enabled [ 359.924400] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 359.932486] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 359.938733] CPU: 0 PID: 14065 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #361 [ 359.946093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.948165] kobject: 'loop0' (00000000a551bf09): kobject_uevent_env [ 359.955469] RIP: 0010:fuse_dev_do_write+0x1dc2/0x3820 12:52:48 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c12628571") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) [ 359.955485] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 e9 17 00 00 49 8b 9d 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 8f [ 359.955492] RSP: 0018:ffff8881ae4074b8 EFLAGS: 00010247 [ 359.955504] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90009e1e000 [ 359.955512] RDX: 0000000000000000 RSI: ffffffff8289ace3 RDI: 0000000000000004 [ 359.955520] RBP: ffff8881ae407a50 R08: ffff8881846ee400 R09: ffffed103705ba82 [ 359.955534] R10: ffffed103705ba82 R11: ffff8881b82dd413 R12: 0000000000000000 [ 359.964343] kobject: 'loop0' (00000000a551bf09): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 359.967113] R13: ffff8881b82dd3f0 R14: 0000000000000000 R15: 0000000000000030 [ 359.967127] FS: 00007fe9d84de700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 359.967137] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 359.967147] CR2: 0000000000000000 CR3: 00000001b2cfd000 CR4: 00000000001406f0 [ 359.967167] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 359.967182] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 360.072930] Call Trace: [ 360.075510] ? __lock_acquire+0x62f/0x4c20 [ 360.079770] ? fuse_dev_read+0x250/0x250 [ 360.083848] ? mark_held_locks+0x130/0x130 [ 360.088143] ? futex_wait_setup+0x266/0x3e0 [ 360.092471] ? mark_held_locks+0x130/0x130 [ 360.096701] ? futex_wake+0x760/0x760 [ 360.100501] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 360.105718] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 360.110824] ? futex_wait+0x5ec/0xa50 [ 360.114632] ? print_usage_bug+0xc0/0xc0 [ 360.118695] ? print_usage_bug+0xc0/0xc0 [ 360.122748] ? futex_wait_setup+0x3e0/0x3e0 [ 360.127079] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 360.132268] ? zap_class+0x640/0x640 [ 360.135976] ? futex_wake+0x304/0x760 [ 360.139774] ? zap_class+0x640/0x640 [ 360.143502] ? find_held_lock+0x36/0x1c0 [ 360.147593] ? aa_file_perm+0x469/0x1060 [ 360.151653] ? lock_downgrade+0x900/0x900 [ 360.155818] ? check_preemption_disabled+0x48/0x280 [ 360.160833] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 360.165761] ? kasan_check_read+0x11/0x20 [ 360.169910] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 360.175200] ? rcu_softirq_qs+0x20/0x20 [ 360.179183] ? aa_file_perm+0x490/0x1060 [ 360.183262] ? memset+0x31/0x40 [ 360.186559] fuse_dev_write+0x19a/0x240 [ 360.190551] ? fuse_dev_splice_write+0xe70/0xe70 [ 360.195336] ? __save_stack_trace+0x8d/0xf0 [ 360.199669] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 360.205231] ? iov_iter_init+0xe5/0x210 [ 360.209210] __vfs_write+0x6b8/0x9f0 [ 360.212924] ? kernel_read+0x120/0x120 [ 360.216824] ? apparmor_path_rmdir+0x30/0x30 [ 360.221231] ? trace_hardirqs_off_caller+0x310/0x310 [ 360.226344] ? apparmor_file_permission+0x24/0x30 [ 360.231202] ? rw_verify_area+0x118/0x360 [ 360.235353] vfs_write+0x1fc/0x560 [ 360.238894] ksys_write+0x101/0x260 [ 360.242523] ? __ia32_sys_read+0xb0/0xb0 [ 360.246591] ? trace_hardirqs_off_caller+0x310/0x310 [ 360.251697] __x64_sys_write+0x73/0xb0 [ 360.255597] do_syscall_64+0x1b9/0x820 [ 360.259483] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 360.264866] ? syscall_return_slowpath+0x5e0/0x5e0 [ 360.270313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 360.275157] ? trace_hardirqs_on_caller+0x310/0x310 [ 360.280174] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 360.285189] ? prepare_exit_to_usermode+0x291/0x3b0 [ 360.290205] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 360.295071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.300258] RIP: 0033:0x457569 [ 360.303466] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 360.322374] RSP: 002b:00007fe9d84ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 360.330079] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 360.337342] RDX: 0000000000000030 RSI: 00000000200000c0 RDI: 0000000000000003 [ 360.344602] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 360.351866] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d84de6d4 [ 360.359148] R13: 00000000004c587b R14: 00000000004d9970 R15: 00000000ffffffff [ 360.366418] Modules linked in: 12:52:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x7, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) [ 360.378610] ---[ end trace e34ebab61855c166 ]--- [ 360.383683] RIP: 0010:fuse_dev_do_write+0x1dc2/0x3820 [ 360.389009] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 e9 17 00 00 49 8b 9d 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 8f [ 360.410783] kobject: 'loop5' (0000000051e62642): kobject_uevent_env [ 360.413764] RSP: 0018:ffff8881ae4074b8 EFLAGS: 00010247 12:52:48 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c12628571") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) 12:52:48 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c12628571") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) [ 360.420125] kobject: 'loop5' (0000000051e62642): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 360.440930] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90009e1e000 [ 360.458298] RDX: 0000000000000000 RSI: ffffffff8289ace3 RDI: 0000000000000004 [ 360.463761] kobject: 'loop0' (00000000a551bf09): kobject_uevent_env [ 360.474941] RBP: ffff8881ae407a50 R08: ffff8881846ee400 R09: ffffed103705ba82 [ 360.486049] kobject: 'loop0' (00000000a551bf09): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 360.489068] R10: ffffed103705ba82 R11: ffff8881b82dd413 R12: 0000000000000000 [ 360.503425] R13: ffff8881b82dd3f0 R14: 0000000000000000 R15: 0000000000000030 [ 360.510118] kobject: 'loop4' (00000000f5796649): kobject_uevent_env [ 360.515414] FS: 00007fe9d84de700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 12:52:48 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c12628571") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) [ 360.518013] kobject: 'loop4' (00000000f5796649): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 360.525549] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 360.559518] CR2: 00000000007262b0 CR3: 00000001b2cfd000 CR4: 00000000001406f0 12:52:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200c72054b4851d000000708f31242ad4f3f3f00d0a0450184f1f53"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x7, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r3}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r6, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r7, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r7, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {0x0}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r5, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r8, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg(r7, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b80)='}cgroupppp0}md5sumself\\\x00') sendmsg(r10, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r11, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r11, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4dbff00000000d106e600000000012d400500000000005504000001ed0d001d040000000000006f460000000000006b0a00fe000000008500000007000015b7000000000000009500000000000000"], 0x0}, 0x48) 12:52:48 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000640)="0a5c2d023c12628571") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914, 0xfdfd}) [ 360.590030] kobject: 'loop0' (00000000a551bf09): kobject_uevent_env [ 360.592102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 360.606723] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 360.609830] kobject: 'loop0' (00000000a551bf09): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 360.614131] Kernel panic - not syncing: Fatal exception [ 360.615100] Kernel Offset: disabled [ 360.633496] Rebooting in 86400 seconds..