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"}, 0x1008, 0x800) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) 06:36:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x8dffffff) 06:36:40 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) finit_module(r0, &(0x7f0000000040)='eth1}vboxnet0user\x00', 0x1) munlockall() msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000100)=""/105) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) 06:36:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0xf0ff7f) 06:36:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) 06:36:41 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) finit_module(r0, &(0x7f0000000040)='eth1}vboxnet0user\x00', 0x1) munlockall() msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000100)=""/105) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) 06:36:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000e8ffffffffffffff0000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000ccd5b79a00006fb4595ff0e3fa34000000001e1a3eea5304045f5a433a75936c9e187126339a8fed1e63dc46267d3902754b9e567fa14d52adec1935277ae36941676f954c71acccfcc9d525452ff8ea6c16afbe2b9eb1bb32b0eacf4559a7d8a47cf59f92397516babee6bb97a5cfa11709b7eb189e71c58e2a90f48d1e14b08624173e797ba34a189877be6595e906d962"], 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="66696c746572000000010000000000000000000000000000000000000000000000000000"], &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) [ 1083.134521] FAULT_INJECTION: forcing a failure. [ 1083.134521] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.166305] CPU: 0 PID: 22258 Comm: syz-executor1 Not tainted 4.19.0+ #313 [ 1083.173345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.182703] Call Trace: [ 1083.185317] dump_stack+0x244/0x39d [ 1083.188977] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1083.194187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1083.199751] should_fail.cold.4+0xa/0x17 [ 1083.203825] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1083.208942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1083.214524] ? wake_up_klogd+0x11a/0x180 [ 1083.218597] ? console_device+0xc0/0xc0 [ 1083.218616] ? __down_trylock_console_sem+0x151/0x1f0 [ 1083.218637] ? vprintk_emit+0x293/0x990 [ 1083.218664] ? find_held_lock+0x36/0x1c0 [ 1083.218701] ? perf_trace_sched_process_exec+0x860/0x860 [ 1083.231810] ? vprintk_default+0x28/0x30 [ 1083.231833] __should_failslab+0x124/0x180 [ 1083.231854] should_failslab+0x9/0x14 [ 1083.253403] kmem_cache_alloc_trace+0x2d7/0x750 [ 1083.258070] kobject_uevent_env+0x2f3/0x101e [ 1083.262534] ? sysfs_remove_group+0xf6/0x1b0 [ 1083.266945] kobject_uevent+0x1f/0x24 [ 1083.270979] device_del+0x6c9/0xb70 [ 1083.274646] ? __device_links_no_driver+0x320/0x320 [ 1083.279654] ? mntput+0x74/0xa0 [ 1083.282975] ? simple_release_fs+0xa1/0xd0 [ 1083.287203] device_unregister+0x15/0x30 [ 1083.291253] bdi_unregister+0x5ed/0x880 [ 1083.295218] ? wb_blkcg_offline+0x140/0x140 [ 1083.299532] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 1083.304978] ? up_write+0x7b/0x220 [ 1083.308513] bdi_put+0x153/0x180 [ 1083.311875] generic_shutdown_super+0x3c8/0x530 [ 1083.316550] ? destroy_super_rcu+0x210/0x210 [ 1083.320953] ? up_write+0x7b/0x220 [ 1083.324483] ? down_write_nested+0x130/0x130 [ 1083.328882] ? down_read+0x120/0x120 [ 1083.332589] ? prepare_kswapd_sleep+0x220/0x220 [ 1083.337254] kill_anon_super+0x3e/0x60 [ 1083.341157] fuse_kill_sb_anon+0x1d/0x20 [ 1083.345210] deactivate_locked_super+0x97/0x100 [ 1083.349868] deactivate_super+0x2bb/0x320 [ 1083.354008] ? get_super_exclusive_thawed+0x20/0x20 [ 1083.359064] ? fsnotify_destroy_marks+0x1d2/0x270 [ 1083.363915] ? shrink_dcache_sb+0x350/0x350 [ 1083.368235] ? cpumask_next+0x41/0x50 [ 1083.372035] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1083.377040] ? mnt_get_writers.isra.26+0xf8/0x150 [ 1083.381876] cleanup_mnt+0xbf/0x160 [ 1083.385492] __cleanup_mnt+0x16/0x20 [ 1083.389196] task_work_run+0x1e8/0x2a0 [ 1083.393073] ? task_work_cancel+0x240/0x240 [ 1083.397392] ? rcu_softirq_qs+0x20/0x20 [ 1083.401359] get_signal+0x1558/0x1980 [ 1083.405149] ? kernel_text_address+0x79/0xf0 [ 1083.409556] ? __kernel_text_address+0xd/0x40 [ 1083.414061] ? unwind_get_return_address+0x61/0xa0 [ 1083.419001] ? ptrace_notify+0x130/0x130 [ 1083.423075] ? save_stack+0xa9/0xd0 [ 1083.426704] ? save_stack+0x43/0xd0 [ 1083.430320] ? __kasan_slab_free+0x102/0x150 [ 1083.434717] ? kasan_slab_free+0xe/0x10 [ 1083.438676] ? kfree+0xcf/0x230 [ 1083.441953] ? ksys_mount+0xa3/0x140 [ 1083.445658] ? __x64_sys_mount+0xbe/0x150 [ 1083.449797] ? do_syscall_64+0x1b9/0x820 [ 1083.453846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1083.459253] do_signal+0x9c/0x21c0 [ 1083.462788] ? do_raw_spin_unlock+0xa7/0x330 [ 1083.467185] ? trace_hardirqs_on+0x310/0x310 [ 1083.471583] ? setup_sigcontext+0x7d0/0x7d0 [ 1083.475894] ? trace_hardirqs_off+0xb8/0x310 [ 1083.480299] ? exit_to_usermode_loop+0x8c/0x380 [ 1083.484955] ? exit_to_usermode_loop+0x8c/0x380 [ 1083.489616] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1083.494203] ? trace_hardirqs_on+0xbd/0x310 [ 1083.498525] ? trace_hardirqs_on+0xbd/0x310 [ 1083.502835] ? do_syscall_64+0x6be/0x820 [ 1083.506887] ? trace_hardirqs_off_caller+0x310/0x310 [ 1083.511978] ? trace_hardirqs_off_caller+0x310/0x310 [ 1083.517072] exit_to_usermode_loop+0x2e5/0x380 [ 1083.521666] ? __bpf_trace_sys_exit+0x30/0x30 [ 1083.526149] ? ksys_mount+0xa8/0x140 [ 1083.529855] do_syscall_64+0x6be/0x820 [ 1083.533729] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1083.539097] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1083.544028] ? trace_hardirqs_on_caller+0x310/0x310 [ 1083.549038] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1083.554042] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1083.560701] ? __switch_to_asm+0x40/0x70 [ 1083.564746] ? __switch_to_asm+0x34/0x70 [ 1083.568807] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1083.573657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1083.578832] RIP: 0033:0x457569 [ 1083.582012] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1083.600897] RSP: 002b:00007fa0099dec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1083.608588] RAX: ffffffffffffff99 RBX: 00007fa0099dec90 RCX: 0000000000457569 [ 1083.615845] RDX: 00000000200001c0 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1083.623113] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 06:36:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) 06:36:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0xd7bdff7f) 06:36:41 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0xc, &(0x7f0000000040)='/dev/audio#\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r1, 0x4) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) 06:36:41 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) finit_module(r0, &(0x7f0000000040)='eth1}vboxnet0user\x00', 0x1) munlockall() msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000100)=""/105) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) [ 1083.630368] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0099df6d4 [ 1083.637622] R13: 00000000004c2b0c R14: 00000000004d4180 R15: 0000000000000006 06:36:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) 06:36:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x40000) 06:36:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB='filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000040)={0x0, 0x0, 0xa, 0x1b, 0x7, 0x7a0b6ab3, 0x1, 0xc2, 0xffffffffffffffff}) socket$alg(0x26, 0x5, 0x0) 06:36:41 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) finit_module(r0, &(0x7f0000000040)='eth1}vboxnet0user\x00', 0x1) munlockall() msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000100)=""/105) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) 06:36:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) 06:36:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x1, 0x2000) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000380)={0x5624, 0x5, 0x8b, &(0x7f0000000280)="d8ef4c6f6d005a83fd8a9b414c223907d0112f33bb05fbe12b9bfdf3362d1939ce3028ca763e2d59a901765a363b9af4b303b8dd014f998955f3a11931f05394ebd0cb73ea260761fc71c59a9098cce409b8ec2fafb57e72fe793a359f62da84e5d4ef1ec26a421c4987f98eeeb4c81c9a8e56c675f2a6783c8d513a25da9c31da965f27b27cb1cce33ae4"}) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000480)={0x3, &(0x7f0000000440)=[{0x20, 0x2, 0xffffffff, 0x6}, {0x2, 0x7f, 0x0, 0xed}, {0x9, 0x6, 0xce52}]}, 0x10) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000140)={0xfffffffffffffffa, 0x1c0000000, 0xc, &(0x7f0000000100)="cd92383f3a75059d3f4793ae"}) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) r3 = pkey_alloc(0x0, 0x0) pkey_free(r3) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000040)="626373020000000000000db92000") getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="66008e5265720000000874ff00c8ece28e00000000000010000000000000001900000a8ae0d8a1c278ae4e63d7e4ff01c137aabdd61c59f94f77cd6b6072927edde4d54dbd17a27bba5662ae257deb273e36"], &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000200)=0x9) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) 06:36:42 executing program 4 (fault-call:6 fault-nth:0): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) [ 1084.098070] FAULT_INJECTION: forcing a failure. [ 1084.098070] name failslab, interval 1, probability 0, space 0, times 0 [ 1084.109475] CPU: 0 PID: 22322 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1084.109491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.125866] Call Trace: [ 1084.128484] dump_stack+0x244/0x39d [ 1084.128508] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1084.137326] ? debug_smp_processor_id+0x1c/0x20 [ 1084.141990] ? perf_trace_lock+0x14d/0x7a0 [ 1084.146218] should_fail.cold.4+0xa/0x17 [ 1084.150286] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1084.155391] ? __lock_acquire+0x62f/0x4c20 [ 1084.159625] ? check_preemption_disabled+0x48/0x280 [ 1084.164647] ? check_preemption_disabled+0x48/0x280 [ 1084.169657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1084.175197] ? check_preemption_disabled+0x48/0x280 [ 1084.180238] ? find_held_lock+0x36/0x1c0 [ 1084.184315] ? __get_user_pages+0xce8/0x1ed0 [ 1084.188754] ? perf_trace_lock+0x14d/0x7a0 [ 1084.192994] ? perf_trace_sched_process_exec+0x860/0x860 [ 1084.198460] ? lock_is_held_type+0x210/0x210 [ 1084.202882] __should_failslab+0x124/0x180 [ 1084.207135] should_failslab+0x9/0x14 [ 1084.210945] kmem_cache_alloc+0x2be/0x730 [ 1084.215114] ? debug_smp_processor_id+0x1c/0x20 [ 1084.219791] ? perf_trace_lock+0x14d/0x7a0 [ 1084.224028] ? _kstrtoull+0x188/0x250 [ 1084.227837] ? _parse_integer+0x180/0x180 [ 1084.231992] dup_fd+0x11c/0xf50 [ 1084.235283] ? find_held_lock+0x36/0x1c0 [ 1084.239355] ? __fdget+0x20/0x20 [ 1084.242732] ? check_preemption_disabled+0x48/0x280 [ 1084.247764] ? perf_trace_lock+0x14d/0x7a0 [ 1084.252013] ? find_held_lock+0x36/0x1c0 [ 1084.256101] ? __f_unlock_pos+0x19/0x20 [ 1084.260092] ? lock_downgrade+0x900/0x900 [ 1084.264314] unshare_fd+0x200/0x2c0 [ 1084.267954] ? mmdrop_async_fn+0x20/0x20 [ 1084.272033] ? find_held_lock+0x36/0x1c0 [ 1084.276125] ksys_unshare+0x4d4/0x10b0 [ 1084.280023] ? wait_for_completion+0x8a0/0x8a0 [ 1084.284617] ? walk_process_tree+0x440/0x440 [ 1084.289045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1084.294587] ? check_preemption_disabled+0x48/0x280 [ 1084.299622] ? __sb_end_write+0xd9/0x110 [ 1084.303696] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1084.309239] ? fput+0x130/0x1a0 [ 1084.312529] ? do_syscall_64+0x9a/0x820 [ 1084.316529] ? do_syscall_64+0x9a/0x820 [ 1084.320515] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1084.325118] ? trace_hardirqs_on+0xbd/0x310 [ 1084.329444] ? __ia32_sys_read+0xb0/0xb0 [ 1084.333511] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1084.338881] ? trace_hardirqs_off_caller+0x310/0x310 [ 1084.344001] __x64_sys_unshare+0x31/0x40 [ 1084.348073] do_syscall_64+0x1b9/0x820 [ 1084.351980] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1084.357355] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1084.362288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1084.367153] ? trace_hardirqs_on_caller+0x310/0x310 [ 1084.372180] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1084.377204] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1084.382234] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1084.387108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1084.392303] RIP: 0033:0x457569 [ 1084.395502] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1084.414425] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1084.422161] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1084.429451] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1084.436734] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1084.444020] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1084.451297] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:42 executing program 4 (fault-call:6 fault-nth:1): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:36:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) 06:36:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0xfffffff0) 06:36:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="e9781d324cc07796"], 0x8, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) [ 1084.617484] FAULT_INJECTION: forcing a failure. [ 1084.617484] name failslab, interval 1, probability 0, space 0, times 0 [ 1084.629135] CPU: 1 PID: 22337 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1084.636159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.645511] Call Trace: [ 1084.645537] dump_stack+0x244/0x39d [ 1084.645561] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1084.645583] ? is_bpf_text_address+0xd3/0x170 [ 1084.645623] should_fail.cold.4+0xa/0x17 [ 1084.645642] ? __save_stack_trace+0x8d/0xf0 [ 1084.645665] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1084.645695] ? save_stack+0xa9/0xd0 [ 1084.645716] ? kasan_kmalloc+0xc7/0xe0 [ 1084.645733] ? kasan_slab_alloc+0x12/0x20 [ 1084.645753] ? kmem_cache_alloc+0x12e/0x730 [ 1084.691011] ? dup_fd+0x11c/0xf50 [ 1084.694476] ? ksys_unshare+0x4d4/0x10b0 [ 1084.698545] ? __x64_sys_unshare+0x31/0x40 [ 1084.702784] ? do_syscall_64+0x1b9/0x820 [ 1084.706866] ? find_held_lock+0x36/0x1c0 [ 1084.710969] ? perf_trace_sched_process_exec+0x860/0x860 [ 1084.716436] ? dup_fd+0xa42/0xf50 [ 1084.719908] __should_failslab+0x124/0x180 [ 1084.724156] should_failslab+0x9/0x14 [ 1084.727967] kmem_cache_alloc_trace+0x2d7/0x750 [ 1084.732644] ? do_raw_spin_unlock+0xa7/0x330 [ 1084.737058] ? do_raw_spin_trylock+0x270/0x270 [ 1084.741659] ? __lock_is_held+0xb5/0x140 [ 1084.745760] alloc_fdtable+0x89/0x280 [ 1084.749575] dup_fd+0xa71/0xf50 [ 1084.752880] ? __fdget+0x20/0x20 [ 1084.756257] ? get_pid_task+0xd6/0x1a0 [ 1084.760160] ? check_preemption_disabled+0x48/0x280 [ 1084.765199] ? find_held_lock+0x36/0x1c0 [ 1084.769279] ? __f_unlock_pos+0x19/0x20 [ 1084.773262] ? lock_downgrade+0x900/0x900 [ 1084.777423] unshare_fd+0x200/0x2c0 [ 1084.781059] ? mmdrop_async_fn+0x20/0x20 [ 1084.785148] ? find_held_lock+0x36/0x1c0 [ 1084.789231] ksys_unshare+0x4d4/0x10b0 [ 1084.793134] ? wait_for_completion+0x8a0/0x8a0 [ 1084.797730] ? walk_process_tree+0x440/0x440 [ 1084.802149] ? __lock_is_held+0xb5/0x140 [ 1084.806232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1084.811781] ? check_preemption_disabled+0x48/0x280 [ 1084.816816] ? __sb_end_write+0xd9/0x110 [ 1084.820894] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1084.826437] ? fput+0x130/0x1a0 [ 1084.829730] ? do_syscall_64+0x9a/0x820 [ 1084.833709] ? do_syscall_64+0x9a/0x820 [ 1084.837696] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1084.842290] ? trace_hardirqs_on+0xbd/0x310 [ 1084.846619] ? __ia32_sys_read+0xb0/0xb0 [ 1084.850693] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1084.856064] ? trace_hardirqs_off_caller+0x310/0x310 [ 1084.861200] __x64_sys_unshare+0x31/0x40 [ 1084.865269] do_syscall_64+0x1b9/0x820 [ 1084.869166] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1084.874541] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1084.879480] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1084.884336] ? trace_hardirqs_on_caller+0x310/0x310 [ 1084.889366] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1084.894409] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1084.899275] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1084.904479] RIP: 0033:0x457569 [ 1084.907679] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1084.926584] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1084.934304] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1084.941575] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1084.948851] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1084.956139] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 06:36:42 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) 06:36:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x7fffc000) [ 1084.963411] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:42 executing program 2 (fault-call:0 fault-nth:0): msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) 06:36:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x9, 0x0, 0xff, 0xd, 0x20, 0x7, 0x8}, &(0x7f0000000140)=0x20) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x1, @ipv4={[], [], @rand_addr=0x80000001}, 0xbc}, 0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={0x0, 0x9}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x1, @ipv4={[], [], @remote}, 0x5}}, 0x100000000, 0x8}, &(0x7f00000002c0)=0x90) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) 06:36:43 executing program 4 (fault-call:6 fault-nth:2): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:36:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0xff03) [ 1085.126021] FAULT_INJECTION: forcing a failure. [ 1085.126021] name failslab, interval 1, probability 0, space 0, times 0 [ 1085.139379] CPU: 0 PID: 22360 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1085.146398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1085.156237] Call Trace: [ 1085.158838] dump_stack+0x244/0x39d [ 1085.162496] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1085.167711] should_fail.cold.4+0xa/0x17 [ 1085.171789] ? __kernel_text_address+0xd/0x40 [ 1085.176308] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1085.181427] ? __save_stack_trace+0x8d/0xf0 [ 1085.185785] ? save_stack+0xa9/0xd0 [ 1085.189428] ? save_stack+0x43/0xd0 [ 1085.193069] ? kasan_kmalloc+0xc7/0xe0 [ 1085.196998] ? find_held_lock+0x36/0x1c0 [ 1085.201113] ? rcu_softirq_qs+0x20/0x20 [ 1085.205123] ? perf_trace_sched_process_exec+0x860/0x860 [ 1085.210579] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1085.216135] ? check_preemption_disabled+0x48/0x280 [ 1085.216162] __should_failslab+0x124/0x180 [ 1085.216182] should_failslab+0x9/0x14 [ 1085.216203] kmem_cache_alloc_node_trace+0x270/0x740 [ 1085.225459] __kmalloc_node+0x3c/0x70 [ 1085.225486] kvmalloc_node+0x65/0xf0 [ 1085.225506] alloc_fdtable+0xd9/0x280 [ 1085.225524] dup_fd+0xa71/0xf50 [ 1085.248992] ? __fdget+0x20/0x20 [ 1085.252384] ? get_pid_task+0xd6/0x1a0 [ 1085.256281] ? check_preemption_disabled+0x48/0x280 [ 1085.261294] ? find_held_lock+0x36/0x1c0 [ 1085.265353] ? __f_unlock_pos+0x19/0x20 [ 1085.269319] ? lock_downgrade+0x900/0x900 [ 1085.273645] unshare_fd+0x200/0x2c0 [ 1085.277263] ? mmdrop_async_fn+0x20/0x20 [ 1085.281317] ? find_held_lock+0x36/0x1c0 [ 1085.285416] ksys_unshare+0x4d4/0x10b0 [ 1085.289301] ? wait_for_completion+0x8a0/0x8a0 [ 1085.293909] ? walk_process_tree+0x440/0x440 [ 1085.298310] ? __lock_is_held+0xb5/0x140 [ 1085.302363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1085.307892] ? check_preemption_disabled+0x48/0x280 [ 1085.312933] ? __sb_end_write+0xd9/0x110 [ 1085.317004] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1085.322540] ? fput+0x130/0x1a0 [ 1085.325811] ? do_syscall_64+0x9a/0x820 [ 1085.329772] ? do_syscall_64+0x9a/0x820 [ 1085.333736] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1085.338311] ? trace_hardirqs_on+0xbd/0x310 [ 1085.342630] ? __ia32_sys_read+0xb0/0xb0 [ 1085.346697] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1085.352051] ? trace_hardirqs_off_caller+0x310/0x310 [ 1085.357156] __x64_sys_unshare+0x31/0x40 [ 1085.361208] do_syscall_64+0x1b9/0x820 [ 1085.365091] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1085.370458] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1085.375402] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1085.380243] ? trace_hardirqs_on_caller+0x310/0x310 [ 1085.385249] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1085.390264] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1085.390288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1085.390317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1085.400160] RIP: 0033:0x457569 [ 1085.400178] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:36:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:43 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) 06:36:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0x16, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) accept$alg(r0, 0x0, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/179, 0xb3}, {&(0x7f0000000100)=""/51, 0x33}], 0x2) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) 06:36:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x200000000000000) 06:36:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1085.400186] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1085.400201] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1085.400210] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1085.400219] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1085.400233] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1085.427489] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:43 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x1008, 0x0, 0x0) 06:36:43 executing program 4 (fault-call:6 fault-nth:3): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:36:43 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x3f000000, 0x0) 06:36:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0xf0ffffff00000000) 06:36:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000d34fe7e1659eabab904a722a56bf06aeaae1e9aba6dea6f02b43b181a5ba6a5585c748a89c12533d625bbf812cbdb4bf120daf0bae7752daf34d92856dde1db7c10ee35b64601b9576b35e535877ab26383953d76f36de8d0ba597189455a637884d4e11d301a9b156ad57261312fa1b5c1331ed355c8e0b62942616f6ab405649d92a"], &(0x7f0000000680)=0x24) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[0x5, 0x6, 0x1f, 0x7, 0x80000001, 0xee9, 0x6, 0x100, 0x6, 0x800, 0x401, 0x0, 0x5c802f2d, 0x3fffffffc00, 0x1b9, 0x5], 0x2, 0x200d11}) accept$alg(r0, 0x0, 0x0) ioctl$KDENABIO(r0, 0x4b36) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) [ 1085.674051] FAULT_INJECTION: forcing a failure. [ 1085.674051] name failslab, interval 1, probability 0, space 0, times 0 [ 1085.694924] CPU: 1 PID: 22379 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1085.701979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1085.711344] Call Trace: [ 1085.713959] dump_stack+0x244/0x39d [ 1085.717611] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1085.722831] should_fail.cold.4+0xa/0x17 [ 1085.726907] ? kernel_text_address+0x79/0xf0 [ 1085.731332] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1085.736443] ? unwind_get_return_address+0x61/0xa0 [ 1085.741387] ? __save_stack_trace+0x8d/0xf0 [ 1085.745742] ? save_stack+0xa9/0xd0 [ 1085.749388] ? find_held_lock+0x36/0x1c0 [ 1085.753471] ? find_good_pkt_pointers+0x3a8/0x6f0 [ 1085.758345] ? perf_trace_sched_process_exec+0x860/0x860 [ 1085.763803] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1085.769365] __should_failslab+0x124/0x180 [ 1085.773631] should_failslab+0x9/0x14 [ 1085.777534] kmem_cache_alloc_node_trace+0x270/0x740 [ 1085.782647] ? kasan_unpoison_shadow+0x35/0x50 [ 1085.787248] __kmalloc_node+0x3c/0x70 [ 1085.791152] kvmalloc_node+0x65/0xf0 [ 1085.794879] alloc_fdtable+0x145/0x280 [ 1085.798782] dup_fd+0xa71/0xf50 [ 1085.802094] ? __fdget+0x20/0x20 [ 1085.805477] ? get_pid_task+0xd6/0x1a0 [ 1085.809383] ? check_preemption_disabled+0x48/0x280 [ 1085.814420] ? find_held_lock+0x36/0x1c0 [ 1085.818502] ? __f_unlock_pos+0x19/0x20 [ 1085.822486] ? lock_downgrade+0x900/0x900 [ 1085.826647] unshare_fd+0x200/0x2c0 [ 1085.830287] ? mmdrop_async_fn+0x20/0x20 [ 1085.834363] ? find_held_lock+0x36/0x1c0 [ 1085.838445] ksys_unshare+0x4d4/0x10b0 [ 1085.842340] ? wait_for_completion+0x8a0/0x8a0 [ 1085.846931] ? walk_process_tree+0x440/0x440 [ 1085.851345] ? __lock_is_held+0xb5/0x140 [ 1085.855423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1085.860968] ? check_preemption_disabled+0x48/0x280 [ 1085.866001] ? __sb_end_write+0xd9/0x110 [ 1085.870080] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1085.875634] ? fput+0x130/0x1a0 [ 1085.878926] ? do_syscall_64+0x9a/0x820 [ 1085.882907] ? do_syscall_64+0x9a/0x820 [ 1085.886894] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1085.891493] ? trace_hardirqs_on+0xbd/0x310 [ 1085.895820] ? __ia32_sys_read+0xb0/0xb0 [ 1085.899894] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1085.905279] ? trace_hardirqs_off_caller+0x310/0x310 [ 1085.910401] __x64_sys_unshare+0x31/0x40 [ 1085.914470] do_syscall_64+0x1b9/0x820 [ 1085.918367] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1085.923744] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1085.928682] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1085.933541] ? trace_hardirqs_on_caller+0x310/0x310 [ 1085.938575] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1085.943622] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1085.948484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1085.953675] RIP: 0033:0x457569 [ 1085.956881] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1085.975784] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1085.983501] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1085.990771] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1085.998073] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1086.005356] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1086.012631] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0xff030000) 06:36:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x4000000000000007, 0x100) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) 06:36:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0xfffffdef) 06:36:44 executing program 4 (fault-call:6 fault-nth:4): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:36:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x5, 0x0, 0x80000000000000, 0x0, 0xd272}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x13a, 0x0) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xffffbfffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) [ 1086.477600] FAULT_INJECTION: forcing a failure. [ 1086.477600] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.477632] CPU: 0 PID: 22408 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1086.495852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.505209] Call Trace: [ 1086.507815] dump_stack+0x244/0x39d [ 1086.511463] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1086.516680] should_fail.cold.4+0xa/0x17 [ 1086.520744] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1086.525836] ? dup_fd+0x888/0xf50 [ 1086.529306] ? kasan_check_read+0x11/0x20 [ 1086.533464] ? do_raw_spin_unlock+0xa7/0x330 [ 1086.537872] ? do_raw_spin_trylock+0x270/0x270 [ 1086.542473] ? find_held_lock+0x36/0x1c0 [ 1086.546580] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 1086.552035] ? perf_trace_sched_process_exec+0x860/0x860 [ 1086.557486] ? get_pid_task+0xd6/0x1a0 [ 1086.561404] __should_failslab+0x124/0x180 [ 1086.565660] should_failslab+0x9/0x14 [ 1086.569470] kmem_cache_alloc+0x2be/0x730 [ 1086.569493] ? apparmor_cred_prepare+0x5a0/0x5a0 [ 1086.569513] create_new_namespaces+0x9a/0x900 [ 1086.569537] ? sys_ni_syscall+0x20/0x20 [ 1086.569558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1086.569575] ? ns_capable_common+0x13f/0x170 [ 1086.569616] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1086.583007] ksys_unshare+0x79c/0x10b0 [ 1086.583026] ? wait_for_completion+0x8a0/0x8a0 [ 1086.583046] ? walk_process_tree+0x440/0x440 [ 1086.583064] ? __lock_is_held+0xb5/0x140 [ 1086.583107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1086.624307] ? check_preemption_disabled+0x48/0x280 [ 1086.629316] ? __sb_end_write+0xd9/0x110 [ 1086.633384] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1086.638925] ? fput+0x130/0x1a0 [ 1086.642252] ? do_syscall_64+0x9a/0x820 [ 1086.646230] ? do_syscall_64+0x9a/0x820 [ 1086.650215] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1086.654812] ? trace_hardirqs_on+0xbd/0x310 [ 1086.659142] ? __ia32_sys_read+0xb0/0xb0 [ 1086.663203] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1086.668565] ? trace_hardirqs_off_caller+0x310/0x310 [ 1086.673682] __x64_sys_unshare+0x31/0x40 [ 1086.677759] do_syscall_64+0x1b9/0x820 [ 1086.681652] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1086.687015] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1086.691947] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1086.696780] ? trace_hardirqs_on_caller+0x310/0x310 [ 1086.701789] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1086.706796] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1086.711802] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1086.716664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1086.721842] RIP: 0033:0x457569 [ 1086.725043] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1086.743948] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1086.751674] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1086.758938] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1086.766202] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 06:36:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068f6", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0xffffff8d) 06:36:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000040)) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) [ 1086.773470] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1086.780750] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:44 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x3f00, 0x0) 06:36:44 executing program 4 (fault-call:6 fault-nth:5): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:36:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0xeffdffff00000000) [ 1086.926885] FAULT_INJECTION: forcing a failure. [ 1086.926885] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.942713] CPU: 0 PID: 22429 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1086.949754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.959124] Call Trace: [ 1086.961727] dump_stack+0x244/0x39d [ 1086.965376] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1086.970585] ? mark_held_locks+0x130/0x130 [ 1086.974853] should_fail.cold.4+0xa/0x17 [ 1086.978934] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1086.984065] ? _raw_spin_unlock_irq+0x27/0x80 [ 1086.988578] ? _raw_spin_unlock_irq+0x27/0x80 [ 1086.993070] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1086.997654] ? trace_hardirqs_on+0xbd/0x310 [ 1087.001963] ? kasan_check_read+0x11/0x20 [ 1087.006114] ? find_held_lock+0x36/0x1c0 [ 1087.010244] ? pty_close+0x278/0x510 [ 1087.013979] ? perf_trace_sched_process_exec+0x860/0x860 [ 1087.019438] __should_failslab+0x124/0x180 [ 1087.023662] should_failslab+0x9/0x14 [ 1087.027453] kmem_cache_alloc_trace+0x2d7/0x750 [ 1087.032120] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1087.037476] ? do_raw_spin_unlock+0xa7/0x330 [ 1087.041871] ? do_raw_spin_trylock+0x270/0x270 [ 1087.046448] alloc_mnt_ns+0x153/0x600 [ 1087.050259] ? mntns_get+0xb0/0xb0 [ 1087.053793] ? pty_close+0x278/0x510 [ 1087.057514] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1087.063066] ? check_preemption_disabled+0x48/0x280 [ 1087.068115] copy_mnt_ns+0x13f/0xc00 [ 1087.071824] ? do_mount+0x31f0/0x31f0 [ 1087.075613] ? kmem_cache_alloc+0x33a/0x730 [ 1087.079949] create_new_namespaces+0x17b/0x900 [ 1087.084527] ? sys_ni_syscall+0x20/0x20 [ 1087.088491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1087.094015] ? ns_capable_common+0x13f/0x170 [ 1087.098432] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1087.103366] ksys_unshare+0x79c/0x10b0 [ 1087.107259] ? walk_process_tree+0x440/0x440 [ 1087.111659] ? schedule+0x108/0x460 [ 1087.115273] ? __schedule+0x21d0/0x21d0 [ 1087.119246] ? exit_to_usermode_loop+0x8c/0x380 [ 1087.123902] ? exit_to_usermode_loop+0x8c/0x380 [ 1087.128563] ? trace_hardirqs_off+0xb8/0x310 [ 1087.132958] ? __sb_end_write+0xd9/0x110 [ 1087.137009] ? do_syscall_64+0x6be/0x820 [ 1087.141057] ? trace_hardirqs_on+0x310/0x310 [ 1087.145463] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1087.150989] ? fput+0x130/0x1a0 [ 1087.154257] ? do_syscall_64+0x9a/0x820 [ 1087.158222] ? do_syscall_64+0x9a/0x820 [ 1087.162185] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1087.166756] ? trace_hardirqs_on+0xbd/0x310 [ 1087.171079] ? exit_to_usermode_loop+0x1f4/0x380 [ 1087.175846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1087.181197] ? trace_hardirqs_off_caller+0x310/0x310 [ 1087.186325] __x64_sys_unshare+0x31/0x40 [ 1087.190375] do_syscall_64+0x1b9/0x820 [ 1087.194249] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1087.199603] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1087.204542] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1087.209376] ? trace_hardirqs_on_caller+0x310/0x310 [ 1087.214380] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1087.219384] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1087.224391] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1087.229239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1087.234417] RIP: 0033:0x457569 [ 1087.237603] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1087.256513] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1087.264226] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 06:36:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x3f00) 06:36:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000100)) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008e3ffffffffffffff00b900000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0x100000000000) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xfffffffffffffffc, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) accept$alg(r1, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) [ 1087.271576] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1087.278844] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1087.286110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1087.293369] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x100000000000000) 06:36:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) socketpair(0x1b, 0x80807, 0x800, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'bridge_slave_1\x00', 0x600}) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0xfffffffffffffffe) 06:36:45 executing program 4 (fault-call:6 fault-nth:6): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) [ 1087.519224] FAULT_INJECTION: forcing a failure. [ 1087.519224] name failslab, interval 1, probability 0, space 0, times 0 [ 1087.532559] CPU: 0 PID: 22452 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1087.539612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.548985] Call Trace: [ 1087.551587] dump_stack+0x244/0x39d [ 1087.555237] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1087.560450] ? debug_smp_processor_id+0x1c/0x20 [ 1087.565129] ? perf_trace_lock+0x14d/0x7a0 [ 1087.569366] should_fail.cold.4+0xa/0x17 [ 1087.573464] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1087.578585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1087.578602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1087.578628] ? debug_smp_processor_id+0x1c/0x20 [ 1087.578643] ? zap_class+0x640/0x640 [ 1087.578671] ? find_held_lock+0x36/0x1c0 [ 1087.578692] ? __lock_is_held+0xb5/0x140 [ 1087.578725] ? perf_trace_sched_process_exec+0x860/0x860 [ 1087.578741] ? mark_held_locks+0x130/0x130 [ 1087.578768] __should_failslab+0x124/0x180 [ 1087.578788] should_failslab+0x9/0x14 [ 1087.578805] kmem_cache_alloc+0x2be/0x730 [ 1087.578825] ? debug_smp_processor_id+0x1c/0x20 [ 1087.589891] alloc_vfsmnt+0xe9/0x990 [ 1087.589910] ? m_stop+0x20/0x20 [ 1087.589932] ? __lock_acquire+0x62f/0x4c20 [ 1087.589951] ? is_bpf_text_address+0xd3/0x170 [ 1087.589968] ? zap_class+0x640/0x640 [ 1087.589996] ? mark_held_locks+0x130/0x130 [ 1087.590016] ? find_held_lock+0x36/0x1c0 [ 1087.660524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1087.666117] ? check_preemption_disabled+0x48/0x280 [ 1087.666144] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1087.676683] clone_mnt+0x124/0x13b0 [ 1087.676709] ? kern_mount_data+0xc0/0xc0 [ 1087.676727] ? kfree+0x1f8/0x230 [ 1087.676746] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1087.676763] ? ida_alloc_range+0x953/0xc70 [ 1087.676789] ? __lockdep_init_map+0x105/0x590 [ 1087.702020] ? __lockdep_init_map+0x105/0x590 [ 1087.706522] ? lock_acquire+0x1ed/0x520 [ 1087.710501] ? copy_mnt_ns+0x176/0xc00 [ 1087.714381] ? lock_release+0xa00/0xa00 [ 1087.718342] ? perf_trace_sched_process_exec+0x860/0x860 [ 1087.723792] ? kasan_check_write+0x14/0x20 [ 1087.728044] copy_tree+0x169/0xac0 [ 1087.731592] ? down_write+0x8a/0x130 [ 1087.735353] ? to_mnt_ns+0x20/0x20 [ 1087.738882] ? down_read+0x120/0x120 [ 1087.742589] copy_mnt_ns+0x1dd/0xc00 [ 1087.746297] ? do_mount+0x31f0/0x31f0 [ 1087.750094] ? kmem_cache_alloc+0x33a/0x730 [ 1087.754429] create_new_namespaces+0x17b/0x900 [ 1087.759006] ? sys_ni_syscall+0x20/0x20 [ 1087.762969] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1087.768497] ? ns_capable_common+0x13f/0x170 [ 1087.772899] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1087.777818] ksys_unshare+0x79c/0x10b0 [ 1087.781694] ? wait_for_completion+0x8a0/0x8a0 [ 1087.786275] ? walk_process_tree+0x440/0x440 [ 1087.791903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1087.797433] ? check_preemption_disabled+0x48/0x280 [ 1087.802441] ? __sb_end_write+0xd9/0x110 [ 1087.806498] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1087.812038] ? fput+0x130/0x1a0 [ 1087.815318] ? do_syscall_64+0x9a/0x820 [ 1087.819281] ? do_syscall_64+0x9a/0x820 [ 1087.823245] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1087.827817] ? trace_hardirqs_on+0xbd/0x310 [ 1087.832129] ? __ia32_sys_read+0xb0/0xb0 [ 1087.836192] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1087.841545] ? trace_hardirqs_off_caller+0x310/0x310 [ 1087.846651] __x64_sys_unshare+0x31/0x40 [ 1087.850716] do_syscall_64+0x1b9/0x820 [ 1087.854592] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1087.859951] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1087.864869] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1087.869702] ? trace_hardirqs_on_caller+0x310/0x310 [ 1087.874708] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1087.879719] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1087.884749] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1087.889602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1087.894790] RIP: 0033:0x457569 [ 1087.897988] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:36:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x7b0020) [ 1087.916877] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1087.924600] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1087.931860] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1087.939120] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1087.946376] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1087.953641] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r1, 0x600, 0x70bd28, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x21}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2b}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000039768d76594000"], 0x8, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = msgget(0x3, 0x180) msgsnd(r2, &(0x7f0000000100)={0x3, "1c05112bd341732d2f32f9dc32833da3036c2de7ba035fbb0cfbfc1883de28774c9fea2091a9ba4fa20fdc2fe9f7faeedfb1c4dfa3c5eb1835575fdefc3fcc4d7627ad36a5610ef7892d86d651d7adae"}, 0x58, 0x800) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) 06:36:46 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x3f00000000000000, 0x0) 06:36:46 executing program 4 (fault-call:6 fault-nth:7): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:36:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x200000c0) 06:36:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x40) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0xb01, 0x10000) renameat2(r0, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00', 0x6) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="2f80fcc09d53368761c0fef4b3b9b42b"], 0x8, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) [ 1088.148320] FAULT_INJECTION: forcing a failure. [ 1088.148320] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.177591] CPU: 1 PID: 22476 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1088.184650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.194065] Call Trace: [ 1088.196693] dump_stack+0x244/0x39d [ 1088.200343] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1088.205583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1088.211151] ? check_preemption_disabled+0x48/0x280 [ 1088.216193] should_fail.cold.4+0xa/0x17 [ 1088.220269] ? print_usage_bug+0xc0/0xc0 [ 1088.224349] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1088.229486] ? zap_class+0x640/0x640 [ 1088.233220] ? __lock_acquire+0x62f/0x4c20 [ 1088.237474] ? find_held_lock+0x36/0x1c0 [ 1088.241557] ? __lock_is_held+0xb5/0x140 [ 1088.245730] ? gen9_init_clock_gating+0x348/0x3a0 [ 1088.250620] ? perf_trace_sched_process_exec+0x860/0x860 [ 1088.256113] __should_failslab+0x124/0x180 [ 1088.260379] should_failslab+0x9/0x14 [ 1088.264196] kmem_cache_alloc+0x2be/0x730 [ 1088.268370] alloc_vfsmnt+0xe9/0x990 [ 1088.272544] ? zap_class+0x640/0x640 [ 1088.276272] ? m_stop+0x20/0x20 [ 1088.279571] ? __lock_acquire+0x62f/0x4c20 [ 1088.283834] ? find_held_lock+0x36/0x1c0 [ 1088.287919] ? clone_mnt+0x4c1/0x13b0 [ 1088.291733] ? lock_downgrade+0x900/0x900 [ 1088.295897] ? lock_downgrade+0x900/0x900 [ 1088.300066] ? kasan_check_read+0x11/0x20 [ 1088.304234] ? do_raw_spin_unlock+0xa7/0x330 [ 1088.308657] ? do_raw_spin_trylock+0x270/0x270 [ 1088.313274] clone_mnt+0x124/0x13b0 [ 1088.316923] ? kern_mount_data+0xc0/0xc0 [ 1088.321000] ? kfree+0x1f8/0x230 [ 1088.324385] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1088.329934] ? ida_alloc_range+0x953/0xc70 [ 1088.334195] ? __lockdep_init_map+0x105/0x590 [ 1088.338708] ? __lockdep_init_map+0x105/0x590 [ 1088.343224] ? lock_acquire+0x1ed/0x520 [ 1088.347220] ? is_subdir+0x2ea/0x490 [ 1088.350949] ? dentry_kill+0x680/0x680 [ 1088.354847] ? lock_release+0xa00/0xa00 [ 1088.358831] ? perf_trace_sched_process_exec+0x860/0x860 [ 1088.364301] ? kasan_check_write+0x14/0x20 [ 1088.368558] copy_tree+0x485/0xac0 [ 1088.372132] ? to_mnt_ns+0x20/0x20 [ 1088.375684] ? down_read+0x120/0x120 [ 1088.379422] copy_mnt_ns+0x1dd/0xc00 [ 1088.383159] ? do_mount+0x31f0/0x31f0 [ 1088.386976] ? kmem_cache_alloc+0x33a/0x730 [ 1088.391347] create_new_namespaces+0x17b/0x900 06:36:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x7ffff000) [ 1088.395952] ? sys_ni_syscall+0x20/0x20 [ 1088.399946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1088.405500] ? ns_capable_common+0x13f/0x170 [ 1088.409932] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1088.414886] ksys_unshare+0x79c/0x10b0 [ 1088.418788] ? wait_for_completion+0x8a0/0x8a0 [ 1088.423386] ? walk_process_tree+0x440/0x440 [ 1088.427796] ? __lock_is_held+0xb5/0x140 [ 1088.431868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1088.437434] ? check_preemption_disabled+0x48/0x280 [ 1088.442477] ? __sb_end_write+0xd9/0x110 [ 1088.446560] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1088.452129] ? fput+0x130/0x1a0 [ 1088.455428] ? do_syscall_64+0x9a/0x820 [ 1088.459418] ? do_syscall_64+0x9a/0x820 [ 1088.463411] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1088.468008] ? trace_hardirqs_on+0xbd/0x310 [ 1088.472342] ? __ia32_sys_read+0xb0/0xb0 [ 1088.476420] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1088.481799] ? trace_hardirqs_off_caller+0x310/0x310 [ 1088.486923] __x64_sys_unshare+0x31/0x40 [ 1088.490997] do_syscall_64+0x1b9/0x820 [ 1088.494904] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1088.500286] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1088.505224] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1088.510084] ? trace_hardirqs_on_caller+0x310/0x310 [ 1088.515129] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1088.520162] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1088.525196] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1088.530061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1088.535269] RIP: 0033:0x457569 [ 1088.538476] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1088.557386] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1088.565115] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1088.572393] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1088.579712] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1088.586992] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1088.594269] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x2) 06:36:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x400040) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x1) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) 06:36:46 executing program 4 (fault-call:6 fault-nth:8): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) [ 1088.822211] FAULT_INJECTION: forcing a failure. [ 1088.822211] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.833627] CPU: 1 PID: 22501 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1088.840635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.849976] Call Trace: [ 1088.852561] dump_stack+0x244/0x39d [ 1088.856243] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1088.861443] should_fail.cold.4+0xa/0x17 [ 1088.865520] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1088.870708] ? zap_class+0x640/0x640 [ 1088.874448] ? zap_class+0x640/0x640 [ 1088.878173] ? find_held_lock+0x36/0x1c0 [ 1088.882239] ? __lock_is_held+0xb5/0x140 [ 1088.886389] ? intel_dp_aux_transfer+0x518/0x7d0 [ 1088.886420] ? perf_trace_sched_process_exec+0x860/0x860 [ 1088.896614] ? kfree+0x1f8/0x230 [ 1088.896637] ? ida_alloc_range+0x953/0xc70 [ 1088.896660] __should_failslab+0x124/0x180 [ 1088.896680] should_failslab+0x9/0x14 [ 1088.896697] __kmalloc_track_caller+0x2d1/0x760 [ 1088.896721] ? kstrdup_const+0x66/0x80 [ 1088.896739] kstrdup+0x39/0x70 [ 1088.904365] kstrdup_const+0x66/0x80 [ 1088.904385] alloc_vfsmnt+0x186/0x990 [ 1088.904403] ? m_stop+0x20/0x20 [ 1088.904425] ? __lock_acquire+0x62f/0x4c20 [ 1088.904451] ? find_held_lock+0x36/0x1c0 [ 1088.904475] ? clone_mnt+0x4c1/0x13b0 [ 1088.946972] ? lock_downgrade+0x900/0x900 [ 1088.951117] ? lock_downgrade+0x900/0x900 [ 1088.955277] ? kasan_check_read+0x11/0x20 [ 1088.959441] ? do_raw_spin_unlock+0xa7/0x330 [ 1088.963848] ? do_raw_spin_trylock+0x270/0x270 [ 1088.968426] clone_mnt+0x124/0x13b0 [ 1088.972057] ? kern_mount_data+0xc0/0xc0 [ 1088.976142] ? kfree+0x1f8/0x230 [ 1088.979499] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1088.985040] ? ida_alloc_range+0x953/0xc70 [ 1088.989300] ? __lockdep_init_map+0x105/0x590 [ 1088.993818] ? __lockdep_init_map+0x105/0x590 [ 1088.998328] ? lock_acquire+0x1ed/0x520 [ 1089.002304] ? is_subdir+0x2ea/0x490 [ 1089.006021] ? dentry_kill+0x680/0x680 [ 1089.009933] ? lock_release+0xa00/0xa00 [ 1089.013911] ? perf_trace_sched_process_exec+0x860/0x860 [ 1089.019366] ? kasan_check_write+0x14/0x20 [ 1089.023622] copy_tree+0x485/0xac0 [ 1089.027175] ? to_mnt_ns+0x20/0x20 [ 1089.030727] ? down_read+0x120/0x120 [ 1089.034452] copy_mnt_ns+0x1dd/0xc00 [ 1089.038160] ? do_mount+0x31f0/0x31f0 [ 1089.041951] ? kmem_cache_alloc+0x33a/0x730 [ 1089.046267] create_new_namespaces+0x17b/0x900 [ 1089.050875] ? sys_ni_syscall+0x20/0x20 [ 1089.054881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1089.060423] ? ns_capable_common+0x13f/0x170 [ 1089.064841] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1089.069761] ksys_unshare+0x79c/0x10b0 [ 1089.073643] ? wait_for_completion+0x8a0/0x8a0 [ 1089.078245] ? walk_process_tree+0x440/0x440 [ 1089.082660] ? __lock_is_held+0xb5/0x140 [ 1089.086727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1089.092298] ? check_preemption_disabled+0x48/0x280 [ 1089.097327] ? __sb_end_write+0xd9/0x110 [ 1089.101406] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1089.106965] ? fput+0x130/0x1a0 [ 1089.110257] ? do_syscall_64+0x9a/0x820 [ 1089.114222] ? do_syscall_64+0x9a/0x820 [ 1089.118208] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1089.122805] ? trace_hardirqs_on+0xbd/0x310 [ 1089.127167] ? __ia32_sys_read+0xb0/0xb0 [ 1089.131232] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1089.136609] ? trace_hardirqs_off_caller+0x310/0x310 [ 1089.141890] __x64_sys_unshare+0x31/0x40 [ 1089.145987] do_syscall_64+0x1b9/0x820 [ 1089.149926] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1089.155306] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1089.160258] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1089.165106] ? trace_hardirqs_on_caller+0x310/0x310 [ 1089.170141] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1089.175206] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1089.180269] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1089.185160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1089.190343] RIP: 0033:0x457569 [ 1089.193524] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1089.212412] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1089.220117] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1089.227400] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1089.234698] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1089.241959] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1089.249218] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000100)=0x3, 0x2) accept$alg(r0, 0x0, 0x0) socketpair$inet6(0xa, 0x2, 0x3, &(0x7f0000000040)) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) 06:36:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x20007b00) 06:36:49 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x3f00000000000000) 06:36:49 executing program 4 (fault-call:6 fault-nth:9): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:36:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:49 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x3f000000) [ 1091.257082] FAULT_INJECTION: forcing a failure. [ 1091.257082] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.281001] CPU: 1 PID: 22516 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1091.288069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.297449] Call Trace: [ 1091.300056] dump_stack+0x244/0x39d 06:36:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x3f00000000000000) [ 1091.303729] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1091.308956] ? debug_smp_processor_id+0x1c/0x20 [ 1091.313646] ? perf_trace_lock+0x14d/0x7a0 [ 1091.317908] should_fail.cold.4+0xa/0x17 [ 1091.321991] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1091.327154] ? zap_class+0x640/0x640 [ 1091.330895] ? __lock_acquire+0x62f/0x4c20 [ 1091.335154] ? find_held_lock+0x36/0x1c0 [ 1091.339242] ? __lock_is_held+0xb5/0x140 [ 1091.343340] ? perf_trace_sched_process_exec+0x860/0x860 [ 1091.348826] ? print_usage_bug+0xc0/0xc0 06:36:49 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x3f00) [ 1091.352899] ? check_preemption_disabled+0x48/0x280 [ 1091.357943] __should_failslab+0x124/0x180 [ 1091.362203] should_failslab+0x9/0x14 [ 1091.366030] kmem_cache_alloc+0x2be/0x730 [ 1091.370207] alloc_vfsmnt+0xe9/0x990 [ 1091.373938] ? zap_class+0x640/0x640 [ 1091.377666] ? m_stop+0x20/0x20 [ 1091.380972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.386527] ? check_preemption_disabled+0x48/0x280 [ 1091.391570] ? debug_smp_processor_id+0x1c/0x20 [ 1091.396264] ? perf_trace_lock+0x14d/0x7a0 [ 1091.400529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 06:36:49 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x880, 0x0) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000040)={0x4, r1, 0x1}) [ 1091.406085] ? check_preemption_disabled+0x48/0x280 [ 1091.411131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.416689] ? debug_smp_processor_id+0x1c/0x20 [ 1091.421376] ? perf_trace_lock+0x14d/0x7a0 [ 1091.425634] ? debug_smp_processor_id+0x1c/0x20 [ 1091.430320] ? perf_trace_lock+0x14d/0x7a0 [ 1091.434569] ? do_raw_spin_unlock+0xa7/0x330 [ 1091.439005] ? lock_is_held_type+0x210/0x210 [ 1091.443450] ? lock_is_held_type+0x210/0x210 [ 1091.447888] clone_mnt+0x124/0x13b0 [ 1091.451537] ? zap_class+0x640/0x640 06:36:49 executing program 2: r0 = msgget(0x0, 0x2d0) msgrcv(r0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) [ 1091.455274] ? kern_mount_data+0xc0/0xc0 [ 1091.459364] ? find_held_lock+0x36/0x1c0 [ 1091.463448] ? copy_tree+0x65c/0xac0 [ 1091.467184] ? lock_downgrade+0x900/0x900 [ 1091.471368] ? lock_downgrade+0x900/0x900 [ 1091.475539] ? kasan_check_read+0x11/0x20 [ 1091.479708] ? do_raw_spin_unlock+0xa7/0x330 [ 1091.484149] ? do_raw_spin_trylock+0x270/0x270 [ 1091.488765] ? __is_local_mountpoint+0x200/0x200 [ 1091.493538] ? lock_release+0xa00/0xa00 [ 1091.497533] ? perf_trace_sched_process_exec+0x860/0x860 [ 1091.503015] copy_tree+0x485/0xac0 [ 1091.506598] ? to_mnt_ns+0x20/0x20 [ 1091.510191] ? down_read+0x120/0x120 [ 1091.513938] copy_mnt_ns+0x1dd/0xc00 [ 1091.517678] ? do_mount+0x31f0/0x31f0 [ 1091.521495] ? kmem_cache_alloc+0x33a/0x730 [ 1091.525847] create_new_namespaces+0x17b/0x900 [ 1091.530450] ? sys_ni_syscall+0x20/0x20 [ 1091.530473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.530492] ? ns_capable_common+0x13f/0x170 [ 1091.530516] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1091.530538] ksys_unshare+0x79c/0x10b0 [ 1091.530554] ? wait_for_completion+0x8a0/0x8a0 [ 1091.530573] ? walk_process_tree+0x440/0x440 [ 1091.540105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.540127] ? check_preemption_disabled+0x48/0x280 [ 1091.540156] ? __sb_end_write+0xd9/0x110 [ 1091.540178] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1091.540194] ? fput+0x130/0x1a0 [ 1091.540211] ? do_syscall_64+0x9a/0x820 [ 1091.540231] ? do_syscall_64+0x9a/0x820 [ 1091.549555] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1091.549576] ? trace_hardirqs_on+0xbd/0x310 [ 1091.549592] ? __ia32_sys_read+0xb0/0xb0 [ 1091.549617] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.549637] ? trace_hardirqs_off_caller+0x310/0x310 [ 1091.617307] __x64_sys_unshare+0x31/0x40 [ 1091.621390] do_syscall_64+0x1b9/0x820 [ 1091.625300] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1091.630682] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1091.635630] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1091.640506] ? trace_hardirqs_on_caller+0x310/0x310 [ 1091.645547] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1091.650600] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1091.655677] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1091.660545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.665746] RIP: 0033:0x457569 [ 1091.668977] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1091.687945] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1091.695666] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1091.702942] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1091.710237] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1091.717532] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1091.724806] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0xff03000000000000) 06:36:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xd) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) 06:36:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x280, 0x0) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f00000001c0)) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:36:49 executing program 4 (fault-call:6 fault-nth:10): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:36:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f00000001c0)={0x0, 0x80, 0x2, &(0x7f0000000180)=0x101}) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1091.958596] FAULT_INJECTION: forcing a failure. [ 1091.958596] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.973656] CPU: 1 PID: 22557 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1091.980688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.990049] Call Trace: [ 1091.992694] dump_stack+0x244/0x39d [ 1091.996348] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1092.001569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1092.007142] ? check_preemption_disabled+0x48/0x280 [ 1092.012192] should_fail.cold.4+0xa/0x17 [ 1092.016269] ? print_usage_bug+0xc0/0xc0 [ 1092.020353] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1092.025485] ? zap_class+0x640/0x640 [ 1092.029223] ? __lock_acquire+0x62f/0x4c20 [ 1092.033479] ? find_held_lock+0x36/0x1c0 [ 1092.037559] ? __lock_is_held+0xb5/0x140 [ 1092.041728] ? mirror_map+0x4b8/0x590 [ 1092.045561] ? perf_trace_sched_process_exec+0x860/0x860 [ 1092.051036] ? print_usage_bug+0xc0/0xc0 [ 1092.055130] __should_failslab+0x124/0x180 [ 1092.059386] should_failslab+0x9/0x14 [ 1092.063199] kmem_cache_alloc+0x2be/0x730 [ 1092.067377] alloc_vfsmnt+0xe9/0x990 [ 1092.071114] ? zap_class+0x640/0x640 [ 1092.074856] ? m_stop+0x20/0x20 [ 1092.078164] ? mark_held_locks+0x130/0x130 [ 1092.082427] ? find_held_lock+0x36/0x1c0 [ 1092.086512] ? clone_mnt+0x4c1/0x13b0 [ 1092.090330] ? lock_downgrade+0x900/0x900 [ 1092.094498] ? lock_downgrade+0x900/0x900 [ 1092.098665] ? zap_class+0x640/0x640 [ 1092.102392] ? do_raw_spin_unlock+0xa7/0x330 [ 1092.106812] ? do_raw_spin_trylock+0x270/0x270 [ 1092.111422] clone_mnt+0x124/0x13b0 [ 1092.115062] ? zap_class+0x640/0x640 [ 1092.118804] ? kern_mount_data+0xc0/0xc0 [ 1092.122879] ? lockref_get+0x42/0x50 [ 1092.126618] ? find_held_lock+0x36/0x1c0 [ 1092.130716] ? copy_tree+0x65c/0xac0 [ 1092.130736] ? lock_downgrade+0x900/0x900 [ 1092.130754] ? lock_downgrade+0x900/0x900 [ 1092.130777] ? kasan_check_read+0x11/0x20 [ 1092.130797] ? do_raw_spin_unlock+0xa7/0x330 [ 1092.151349] ? do_raw_spin_trylock+0x270/0x270 [ 1092.155949] ? __is_local_mountpoint+0x200/0x200 [ 1092.160722] ? lock_release+0xa00/0xa00 [ 1092.164703] ? perf_trace_sched_process_exec+0x860/0x860 [ 1092.164730] copy_tree+0x485/0xac0 [ 1092.164759] ? to_mnt_ns+0x20/0x20 [ 1092.164774] ? down_read+0x120/0x120 [ 1092.164802] copy_mnt_ns+0x1dd/0xc00 [ 1092.164828] ? do_mount+0x31f0/0x31f0 [ 1092.188534] ? kmem_cache_alloc+0x33a/0x730 [ 1092.192884] create_new_namespaces+0x17b/0x900 [ 1092.197486] ? sys_ni_syscall+0x20/0x20 [ 1092.201486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1092.207036] ? ns_capable_common+0x13f/0x170 [ 1092.211465] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1092.216427] ksys_unshare+0x79c/0x10b0 [ 1092.220329] ? wait_for_completion+0x8a0/0x8a0 [ 1092.224927] ? walk_process_tree+0x440/0x440 [ 1092.229351] ? __lock_is_held+0xb5/0x140 [ 1092.233438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1092.238996] ? check_preemption_disabled+0x48/0x280 [ 1092.244034] ? __sb_end_write+0xd9/0x110 [ 1092.248123] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1092.253675] ? fput+0x130/0x1a0 [ 1092.256972] ? do_syscall_64+0x9a/0x820 [ 1092.260964] ? do_syscall_64+0x9a/0x820 [ 1092.264954] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1092.269559] ? trace_hardirqs_on+0xbd/0x310 [ 1092.273891] ? __ia32_sys_read+0xb0/0xb0 [ 1092.277964] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1092.283347] ? trace_hardirqs_off_caller+0x310/0x310 [ 1092.288479] __x64_sys_unshare+0x31/0x40 [ 1092.288497] do_syscall_64+0x1b9/0x820 [ 1092.288519] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1092.301831] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1092.306770] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1092.306790] ? trace_hardirqs_on_caller+0x310/0x310 [ 1092.306809] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1092.306828] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1092.306851] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1092.306876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1092.306893] RIP: 0033:0x457569 [ 1092.326754] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1092.326763] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1092.326793] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1092.326802] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1092.326811] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1092.326820] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1092.326829] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068fe", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000fc00000000000100000000000000000f00000000000000000000000000000000000000000000000000000000000000000000ffff00000000000000000700000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000"], 0x72, 0x4, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0300f0ff00000000"], 0x8, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000000000000f52391930111facf0e6d0397471105ba5b06a92bdf79293d59343d8d734eb8a073a70ff978718f829b02a94146679dbe8ab72f15a69be15de80d93751a4f"], &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000006c0)={"559e35d0d49b6525fb773d4102acd1f8234317a52a6592a1212c03ab175f6085b75b7dcaebb59465510e4059f08d783a301a438a135e99cac6cecd1b35306a03988b7552d04a76f157ffd9f1c94c61c0d02bcc218045e6edbfd60eb1125745606e3e9bd5fbb2c6456c7cb3db49ff81fd8b28eaa51a8ad1a97503ef9db258501531073f96c3ae8767b8849b17a7ba61ff4d00ac16a7ef8a6313edfd9739cc0a76e1043db05bb0b5c4cf3660aaaee236a3152c6491d08340c7d6f04a0052fec8648c6551cd3e59b48d153065d8b795ce17f0cd1468c6deaeca44b1e8b2a9a37fff8396dfb723f85e4b1d0a9e9b9e50b1d33264990cd94adaf6856774ce00a36f6cf7b599790149561e51c387cd0a1770fd6397126300069442577fb5e0456ed9b8b226a3d2b12662ab24ff547bf7b74980176016cc6dfa91c34e49092f39a15158ddf5055bbf6bbe77c6059b1b915cdea0a8f99a6ddcfed04c422ead8863f8f9da7054ff40f5cf4c352bb7b71e846934f3a9087a660e82b03ca89db795b30d21fda30fdfbf640cf55bb06a311d926492de27fdc36fd4a766dd43bc01cd0c406d2a6474d7a166389f010a436ef973fd12450bc2ba8b92d0451b7c9e432efe6e7f89da9d8d2490c436f97c02443563728b416aac9c8afb12d93afdf5484ac8b8d8d47af82baa972ed9eb536b21f69cb638365a4e670a41b96294df5a79e5528707a17d8795243fe56524b4d9c8e845e96770cc46a845810477225208d2d8c40bd590f72f21ee02c3ad142e44153e99446aa546e9f2a1a394e01414601a5e8b29e83503327c9df66c3aeda0778be37b3d29aa24c94a63477f81d50643f3ad7a63ec333fdeca6f084223ccc48070af3535f01c1e88f929a688706e612e62ce7ee5efec4e26d3651ca3e7014be8f6a8222c475217e699f31efed6bb2a7d85664efc682a6a9c4f94b94b98bddc1dadcb1a6e013e56309557e74c265fd719f48051b85e8183a697b53d5815b1972f798c2d7f6c0bb1c442a8ae616eacfd6c9ff68db487bd48aa426038837991bf990cf00529b826d5260ed39a2191edd951035ac3a72c1a3b98fec2bbf67e31ca3f0528c7882b1ccde11866a880ac3b14ffd91be70d4df4d61d14e79e36928c52b7e1896d9223c55e0c97e7cdb08ef2c616f6bee21843ed3c26a0159a02e0fd1fb3fbb9ae3dfc1a999d3e55e7d063c05415468c86eba92060be424cac9e9ed2988e11fec5ea604fcb5241ca769c847b4c7960b51e0feda343c15aab500834956db6a95a85c766064c64f24060ad67364a54173049748425471c42585fdc769cc1c59817c22c9d112404092c928a98dbeb89a611c31348729255718b27338251168f3879e986ab0789fe0da637ed95bd4e4ec52d994f7c0f1a9183a7b4a4bd1e162e8a325b1f92aeba0b1a17079e60bd4ec166193172541c"}) 06:36:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:36:52 executing program 2: msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000080000000000000000000000000000000000802dfd0f8d9baf2e542dd5824900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dd00000000"], 0x72, 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) r0 = syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0xfffe, 0x22401) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000180)={0x40000000, 0x7, "33cb67aefe7e31fb0569ba23010b6b51da1bc594f4ba20f5f7e7751a7b69b6c1", 0x1, 0x0, 0x80, 0xc1dd, 0xce8, 0x5, 0xd29a, 0x3, [0x0, 0x3f, 0x1, 0xe8]}) 06:36:52 executing program 4 (fault-call:6 fault-nth:11): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:36:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1094.387845] FAULT_INJECTION: forcing a failure. [ 1094.387845] name failslab, interval 1, probability 0, space 0, times 0 [ 1094.412564] CPU: 1 PID: 22582 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1094.419623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1094.419631] Call Trace: [ 1094.419657] dump_stack+0x244/0x39d [ 1094.419684] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1094.440426] ? debug_smp_processor_id+0x1c/0x20 [ 1094.445129] ? perf_trace_lock+0x14d/0x7a0 [ 1094.449389] should_fail.cold.4+0xa/0x17 [ 1094.453473] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1094.458616] ? zap_class+0x640/0x640 [ 1094.462407] ? __lock_acquire+0x62f/0x4c20 [ 1094.466663] ? find_held_lock+0x36/0x1c0 [ 1094.466689] ? __lock_is_held+0xb5/0x140 [ 1094.466725] ? perf_trace_sched_process_exec+0x860/0x860 [ 1094.466742] ? print_usage_bug+0xc0/0xc0 [ 1094.466758] ? check_preemption_disabled+0x48/0x280 [ 1094.466785] __should_failslab+0x124/0x180 [ 1094.466806] should_failslab+0x9/0x14 [ 1094.497473] kmem_cache_alloc+0x2be/0x730 [ 1094.501666] alloc_vfsmnt+0xe9/0x990 [ 1094.505393] ? zap_class+0x640/0x640 [ 1094.509133] ? m_stop+0x20/0x20 [ 1094.512445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1094.517996] ? check_preemption_disabled+0x48/0x280 [ 1094.523058] ? debug_smp_processor_id+0x1c/0x20 [ 1094.527754] ? perf_trace_lock+0x14d/0x7a0 [ 1094.532017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1094.537570] ? check_preemption_disabled+0x48/0x280 [ 1094.542641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1094.548204] ? debug_smp_processor_id+0x1c/0x20 [ 1094.552889] ? perf_trace_lock+0x14d/0x7a0 [ 1094.557154] ? debug_smp_processor_id+0x1c/0x20 [ 1094.561867] ? perf_trace_lock+0x14d/0x7a0 [ 1094.566124] ? do_raw_spin_unlock+0xa7/0x330 [ 1094.566146] ? lock_is_held_type+0x210/0x210 [ 1094.574966] ? lock_is_held_type+0x210/0x210 [ 1094.574996] clone_mnt+0x124/0x13b0 [ 1094.575012] ? zap_class+0x640/0x640 [ 1094.575036] ? kern_mount_data+0xc0/0xc0 [ 1094.575061] ? find_held_lock+0x36/0x1c0 [ 1094.583091] ? copy_tree+0x65c/0xac0 [ 1094.583122] ? lock_downgrade+0x900/0x900 [ 1094.583140] ? lock_downgrade+0x900/0x900 [ 1094.583165] ? kasan_check_read+0x11/0x20 [ 1094.583182] ? do_raw_spin_unlock+0xa7/0x330 [ 1094.615559] ? do_raw_spin_trylock+0x270/0x270 [ 1094.620155] ? __is_local_mountpoint+0x200/0x200 [ 1094.624921] ? lock_release+0xa00/0xa00 [ 1094.628912] ? perf_trace_sched_process_exec+0x860/0x860 [ 1094.634401] copy_tree+0x485/0xac0 [ 1094.637940] ? to_mnt_ns+0x20/0x20 [ 1094.641488] ? down_read+0x120/0x120 [ 1094.645202] copy_mnt_ns+0x1dd/0xc00 [ 1094.648936] ? do_mount+0x31f0/0x31f0 [ 1094.652737] ? kmem_cache_alloc+0x33a/0x730 [ 1094.657072] create_new_namespaces+0x17b/0x900 [ 1094.661710] ? sys_ni_syscall+0x20/0x20 [ 1094.665688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1094.671219] ? ns_capable_common+0x13f/0x170 [ 1094.675647] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1094.680588] ksys_unshare+0x79c/0x10b0 [ 1094.684490] ? wait_for_completion+0x8a0/0x8a0 [ 1094.689063] ? walk_process_tree+0x440/0x440 [ 1094.693491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1094.699037] ? check_preemption_disabled+0x48/0x280 [ 1094.704049] ? __sb_end_write+0xd9/0x110 [ 1094.708114] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1094.713643] ? fput+0x130/0x1a0 [ 1094.716925] ? do_syscall_64+0x9a/0x820 [ 1094.720906] ? do_syscall_64+0x9a/0x820 [ 1094.724896] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1094.729486] ? trace_hardirqs_on+0xbd/0x310 [ 1094.733807] ? __ia32_sys_read+0xb0/0xb0 [ 1094.737895] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1094.743268] ? trace_hardirqs_off_caller+0x310/0x310 [ 1094.748366] __x64_sys_unshare+0x31/0x40 [ 1094.752420] do_syscall_64+0x1b9/0x820 [ 1094.756309] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1094.761682] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1094.766631] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1094.771507] ? trace_hardirqs_on_caller+0x310/0x310 [ 1094.776539] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1094.781557] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1094.786591] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1094.791459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1094.796658] RIP: 0033:0x457569 [ 1094.799882] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1094.818771] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1094.826475] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 06:36:52 executing program 2: r0 = msgget(0x1, 0x20) msgrcv(r0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x44ee81, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x558, 0x258, 0x118, 0x118, 0x470, 0x470, 0x470, 0x4, &(0x7f0000000280), {[{{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x3}}}, {{@arp={@broadcast, @broadcast, 0xffffffff, 0xff000000, @empty, {[0xff, 0x0, 0x0, 0xff, 0xff, 0xff]}, @mac=@remote, {[0xff, 0x0, 0x0, 0xff, 0xff]}, 0x8, 0x8, 0x0, 0x1, 0x4, 0x6, 'bpq0\x00', 'veth0_to_team\x00', {}, {}, 0x0, 0x22d}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@local, @dev={0xac, 0x14, 0x14, 0x1d}, @broadcast, 0x8, 0x1}}}, {{@arp={@multicast1, @broadcast, 0xffffffff, 0xff0000ff, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0x0, 0x496a1217d4811851, 0xff, 0xff]}, 0x3, 0x324e, 0x14, 0xfffffffffffffc01, 0x4, 0x0, 'eql\x00', 'sit0\x00', {}, {0xff}, 0x0, 0x200}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x7, 'system_u:object_r:run_init_exec_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000240)={0x7, 0x48a, &(0x7f0000000140)="76b025bc6c71a8b36e3419cda5fe02f6b270358486bef9d1ad7233f11ec2cd447c86c0ad8eba59d0c7069f71dcd7045d8a2024720ffeb714da667cd81c70698080cb9cef8f9c7cd762a224d64cd0bf0135e94706f299f6eb2b3bedd9c70d", &(0x7f00000001c0)="96adf114ae0089005785ebf0614bb4a527c1abe4d462a750b4091375c78805c19b6d043328dca8077ff2758916cb93fff5b0ae1c4eae9dea7daed29b53e40bcd046558c19f04df8f6a0f50e911a03651f7693589eedabae0765e618be9fa08", 0x5e, 0x5f}) flock(r1, 0xb) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffff9, 0x80) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)={0xad, 0x1, 0x1}) 06:36:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$sock_bt(r2, 0x541b, &(0x7f0000000300)="8b24c4c634e4cdefe5968465c41d9fe88157f565dcad23700d01fb924caf609cfb4937e524987443b6cd8ac0a0086334d15a033ff7784a48cfd9cb3951758fe0045971d7df25b20b4fc84935fa5ec11d1564b7cb2b2f209af0ccb8498dc9995ae5c3576871ee57816fdc3df8bebb4edb3fb09400d6c065b126d86aa9c49f1022fda83611a9170820b6bd66622608097a7704fe437b6792e3b6577977aa9a4c7321d539aab92a3c6993f138eb0a090eb42c3871de6d809d0b99091c38d886eb147f1353bd2e06525362a82a30f13c0804154a3006dca6cbe6916bc5b0d67c72f61bf72ccefeacd73dac") [ 1094.833753] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1094.841024] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1094.848284] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1094.855542] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:52 executing program 2: r0 = msgget(0x2, 0x20) msgrcv(r0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) 06:36:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x2c) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:36:52 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000003bc0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$P9_RCREATE(r0, &(0x7f0000003c00)={0x18, 0x73, 0x2, {{0x40, 0x1}, 0x1}}, 0x18) msgget(0x3, 0x0) r1 = msgget(0x2, 0x400) r2 = getpgrp(0x0) r3 = open(&(0x7f0000003a80)='./file0\x00', 0x200, 0x20) r4 = creat(&(0x7f0000003ac0)='./file0\x00', 0xb) pipe(&(0x7f0000003b00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000003b40)={r4, 0x7, 0x73ba, r5}) ptrace$peek(0xe20aa71ab1b2e1f6, r2, &(0x7f0000000000)) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r3, 0x114, 0xa, &(0x7f0000003b80), 0x1) r6 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x400002) sendmsg$alg(r6, &(0x7f0000003a40)={0x0, 0x0, &(0x7f0000003600)=[{&(0x7f0000000180)="9f3d3bbdddab77b09b5f8dbd964c54860a5096f9927fb1761fd8969edca9b4e4da703822b001a23e09a26a505cf538edcdb8aeebf732b826e2aa2f7d7ea36d803450ecdafe2580b1219a303d023bc56a4ddb30993b3ffeb7a7cf1ffdcff3b73e51c0d020ebb88c128cc347346b2e0aa923e75bc769b74f4ea7e8ad1f2ceacbfd853b0c371e2d4f827f775ce3b3a3c022b01e061508fc4414481913618560c8c1711cb7ee58b3c29f52c5e918f860da4762c7c6439ac8320c8fd5ca2b9c3e", 0xbe}, {&(0x7f0000000240)="a15df5bbb1f817df48719232f6de8ba27a1201d800842a1f6c06320e3a38266c50b5654afd912106f4992a17e34811c9bd1f45a29e5bb233c73102110c7664234281f67a8f611c35750668c868190d6a19d3737a0032b2b6cd893227b697efcf0ab47d39ef6787f1439d9cd4994a8ba3319a1f36085baf7927adf00451e2d1110582c63fa3027fb648e4f0854b2efbba682d41ccc3d07ef32a8b56d0dd62419e9f1dfb419ee90ec63feb2d44b099ff9aca6952d0b53717b1481f48", 0xbb}, {&(0x7f0000000300)="74a971f410d1bdfea79918984d26545e7ce580a9c7a87f66d8138628a03fe867ac798f78cfb45e182a393df9ef4964705e79689f71b3e9f1e1daf3a96c88ebbd0a3dc055a026a026929b9631a73e337d2ae20801961c490912ff909629906a4d76876ef1b7af18d0af4aaba2a3ba33abad910168be778c3663cf24436320af3d2bc18ffd3a842f7ed1293bde367c385d048c45787d44061c8eb9b397b463cfe56b206e6331b1d89595c4c15d3df7b649f189cf1ff1cbf6266ccdd6e7e36ea7467affdf6026aa7038018d7347ed60004dc0032d28771980289954a9cb7d473b", 0xdf}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="eabad3d004c694ccf1133651d7865c4d94b622811dfda1104f5a7619cdb272c59ecf78dddba9a0857f8ea4542dde71d66b00ca00ca783e7304686b2d4cd84bbdb29c9a2435e97b818150fe6b9790e83ea29e8d1f3f9178988812801892a2cc3a2d0d98216a605743593a9d5afd8aab3ab08eea5d26d8c25527321715cb04230e475c58a211b99a7c33fd21475acad47f190397924da1a4f0d853a97cbdecfe15", 0xa0}, {&(0x7f00000014c0)="d2973db2a407286a4b50bc02265347a56d1f01f2774363de12a44406445010fcc08e696b", 0x24}, {&(0x7f0000001500)="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", 0x1000}, {&(0x7f0000002500)="543381c1b03a9b01d6bc558a2f023a038adfce08222551956ff0166fb8c255a211e2acf315fc2256f3cce7e9dc1425385361adc377138c3761c215e62e050861d4f177948925e3b72b2e44074ee826473b0f1e15aae1aa7cb5ba496f68174ea18c8641703ae25a06b8ce1a5ceca4f5ca84528112090c95fc57d46f0312c5c51eeda67f6e0eb961703db7df33ba4944336214191f06ab459dac4b9bc8344a949f3c8047d5b88f0750267da2806ca0e397c277d791056392fb315bbe8ce3080bdb56d8cfd949ac1e637828f1f435b351dc61d4d3e85086435bc78dec78d01377b488dbe4efc5e77e7464286503ed8fd3b7ad192a77d8e9e7b33dfb709ea6c9b6106daf6751f6a64cad4ffaea0fb3d801dc9f93c6de2fe55093d6c53786d21477a3fd2beda8b2bdb4546ffe0594b017aec9582fc28f6de46a274bf07b5ee88e049499f83e1e4d076a67fabe1581150dafe8b8da935bc654900edb91a5e25346951fd2210eb5ef9ad4f16ee501174d718c7ca9d4ffcb85c31704f600124c63401206db48a37a9e90d5619c3a3550660ebc75df9dc3091d9db7595d6c2c28a33905fb6323a3db394cca7bf3b10b2a6908b522d7a8203e4164f3d95ac14a198daea969233f55f637ec018d8ccdceaec7a0d43e27149fa6cc68ae7451039a234ca87e68b08e7c130da0c5bf5ceb99c343716ef8c762eea50270510a62d2e7589996acb7e1583bca5f028972f708ae51ab54432d4251cb7ca037ffc9c2561a526d0fec7d9c1217394defde994018f67b1520275d1234ffaed791656fedc6581f87f2c4b4385b541d9f454fe7d2331d594022ea433f7f537a96feebab5b9e5e3175938c031c399b4495625666cb311cd4e58d4920ffa02a31db403043e28554b9d9a3139d5f55c815c8a71a0ad1ddeaee6088786567880b1b8e2bc73624b22063566e6f916656324c2e0055e288a1747a10ca81400a82384dbce4c97f353d207342b7a941a919185b209c6baca7741d36be82792ebba5515e03cce85961fbd0e0748dbfc2e5a683ad602ed9eb2b3037556c90dce07dc9ad82bf523d710bf8b4ce0dd811ab790e37a73509c17788055354f87d2e6e2eb9e9402df1fdbaceb595915ab62f9a06122b1528bf9a78f1b34b4f05beec4d516ffb68c0904aa6262d91c68f8dd5af39f624c4955606ca9752ca45af5baa71cd63d32c0687f88ce242d1c423f63258f2a7d14921e3ac3ba646ae110977702b96e217cb29e5f52d2c02b8efe95c30474bed48dcee8f95a042e71905d0876d6bcd21e535f933ce66fa4d3bd27d641c115ea6a75823f992c1f53a3336710556276bfab2f8a1bf0e30742d84c7c1a6ea5362193827e890d6386536546ee5ce335316a9e49d1f37a061acbac08076d08954765f20f0eed82e8593964c36ee31029e5fa8b0a04b178737585758db8e718c3f0420a4e7cf89ce312217221dd6c2fbe8539a4c780c28e31c38d21ee003a2e651ad84b0212d2f7e8a879c645c322ef556afa6b8f87ed633ec7c8cd797f884279cdcce8208088550a691c0f0d538fd869c12279c2635e661689c7fab64dc5b128bca082d322f8ff9ef9490937d18662475a9be23728021ac6e91c1981b21f6f40c3ead1c64ba087f3645227ecd1010ba427b4b9b206d54fe82669a07a1f7953ba6c7213f857a491aa09918a67bf467a85b91b1203e570fa4ed60536ba9cafe097260073e485af825da62900169540ac6e9f38c4a136818d4b8bdb9f02d12f86b92a8debead453941713f97a92109ee36f1dd817bae1bb50f5338b4faa2a55ec269f491f5dfa0a0fa0fd8ccd269a60fb296c23c6e61cb9809036e438a64d48004a4016cf56d1577d48b905608dc637cd0a2f7ffe3b3ee1588e085587dd9eaf1f1dbfd3253182657c25f1cb4e14328d465a4668950415b45f65c9e458efdad49a9ffaa49ced12ff75ee96defd4a3e10aca4044b3495b232d4ac8a52a22ee3447012b87d4d34b311b9a9e22dd109ed90d44457c3915dcf505aea563d6e90d5be5c0f4399f103077741e96d530e0b6fca20609099a4e450c73d5fde36bdcc97227bf9a0263fb4221034a4b330e6575213a2a9f5578d3682e502552dc1a80eac6855112d63c6839a3feb8169fd7bec1b5806439b48e13b8e0139f3cbe7b6926852600959784d99ea7ae77058d6cea6ba8fb852e64a78a969eafd16e3d5d93930f906314affa6456f2a2d16f3ac3b26f3308d31a4de60a15a4b5d9814551d77fadecd1470118efd18c1d9a1c76d28f6c0aec8f5183add29f30ae8f1ab7758f70b5b41469c40b7020cb29761973c16364c0a832fd99f7c2dbfa121397bb8bd0d846c75b78c5f4d5778aa2b7d2640a86541d299eb1d140cc52226507162af975092200a92014ff421e6145ac406653ab210be181d21bd5c64617d8dcbb168094bc120f2dd11237cc7ed406636a8e77e8f430979d695926d57c63cd72dc0ccc29866b1546684d71dc8d70ad866b755be890fb81c8cd5e715dd68da2801fb1a679b656f1272b5af3138e01fbb3395465f75e8e2d829247b8c231ad4c9cd859f915b469b16de635a2efe48ec48934ff3ec6e89ed57957a0fa0dcd6fc65a8e282af1c4689f9b7cf80c934f4fe6271918ef72e16ee3ddaec87dc70b879b70d2d0707534cacd5584e2798c73402abe67e68ade3680674bd6a5326c3cb9d52de55cfd2637e5c44c33698f65d752cf9ea4eec4673354176a5377a8a7c38c12823d2ae2e371450e049be32559f2aae4c524ca0c3d9ddd87a510aa64419d6458a14b86f451586bb4e02c1ceaa7f53d75c14aabeb2475c6dc4f72855c92f0ab1fce0894b0651c3c32c3253d2d710798fd6b94ba1d6a0393b05bc3a2634ed2931f53ea425e694375bc75026d6ea2d44aac39564f915d75585dfa30c5a9391f01d7f997a4302e6a854ec885f542fae434f897d0e6be6e36ee9351c35e080b1d35b416664f7f298d6ef0e850930934b1cb28ddfa66e7eba644cdd8500a0cc47462ee22e6948216f8076e797533a21b6ebaffa0fd3fbbdc1e304ffbb92b6c0f2a221199fbc57a1dedc6e37bfbd109895edf8a4467a80f6d593fb8df9a1a74a4098d2b50e4f5c5431420255e6c6b677a33e0272ff90fba4eee5dd45f8849b6c489a039ff7d9a5a7cf252f2f1691b1b850dc6db71150ce95912019db17a23dec5a108510d7dd57bc36a3d225515665ad31c9263f133131b058245dbe39465097f936da014968e2f268c043dd06fc2e482af173f60b93eee807425f68f91d733b5b9ad27674fd6e34e7084862e0d6892270e266441870e8c255e0223b721abcbbf5db1a7d4a49c1045da4c35fc9f343b967ccbbc1f8bc2370f240e36bd46c1f0e0c2534c478ea1df9e41976bf832431e9ac6701628774b8ce0a4268a01c02df6d3c9bb56d7faf6546f45cf9e36315c1a519eeeac4698398b63bcc3403a1cf5dfd7f8253a186d9299d3d6f9db35d8a6aec3f3f0b44469d367a7b1f8fed426e9327302cf50faff6a85ef18bcb3584201d62904b35fa1e6077990fc599ec8969c88583ee2f4c0ce1233213ed64dd11b0988b61870a6f5fb413daf1881a776ccbd0e1d602f15a01c15f68c4b914a76c6b9bffc297733c4dea3cbcd0314a94e7bd40481e608b98ae6ad8f47ec290522ab7b7f29f32f6e71123bfa59144dd4f8b369fa82d22df46dd53873a96290c548f44f1cd3575b1d3b8fc10614d98aa7f99e03820d299c1ea661ea2b7b85e083392bb564c52b6e8ca2971fff54f79e929cbedc7d3e9c9d69adcca879f666f2ee0ff60327da08c15326beb9648b5ed92161943a68388652051395176218d1acac90ce262a90a22002347f557d4018a3d12b40e56b2226e2129bd9ece960af20717308c904a12d01704e39bb46a31f68b86d84af11004b164c5a6660256757e0d5999aa025e737c8275b69dd808d61f6b6e8eb8fae924343c18aebc18452cf3ee013e1333742fe875e0eb0d764e5ea20f0d3c07c7e489d6277b05f391fbe1ff505136996591148c17ace97d006a14889db80468a412031443cec478eff659737a2e95f0e3c1715361f2880f13df5ef3d7359aefeceb040f76fb4cabee79318175b17bc8385322569fcd7e4506b9fa07b7014105e6a1d7252d6dc787a6d6fd97dcd9f0451038b6400def0bb59cdd8f889aa10bbc2c2858caf96f7c3cffe3fd894d5c195d0d0e404437291d5cc278726086af252bf06ece3ee6891d65ef4bfd8849c046f5e7f31923d0b8ae765cc8e86392132a0ff9ccd5d84d96a448e2a8c73bd9fe9c99f00afeff85ce593f1c3e22a971bf28f79771d0c71e194ed02b156863c2c8e8f9953a282f8882b5e5368354bcd1206fc14a739124e815e7836c67da19d7933d496a583fcfc035db8d8ca1c17bdbe9caff2ee97f33c8249e1caf24478965af789cf415991d83a372d843d17e73ead6ea66d2b9c462bd73b3d767d888639b43a136dfbf82873bc4e57968beba8c265d6ebc0046b3adff3e384749757c9a69e1b9090875d4de1c4e91773d482bcae768108ffd3d6b8596db4292f023069bdd29f5fd8951ae1a9eb25b9cae3d8c9808e74c418ddfa8122e9d47c0048ac68aa4195a7b684325b6f90ffb1d6b3eb5e6a205ae0ec9c1bcffcead732615c328075491735c8daa58fb1ab9824a91a8966941e332432d88702f50bf1fdf60a958ed627e919b9091a3e0fa660ea6b43c9fa57676c74fabc79859594621747b31756bc411bcf01b6d43b829cbb19bfd9e5e5590bfde2e597f199495669bede3f21fded57583dd4d9255f1a98eb276258533b2f7e45863862859d526325f8b1d70d55c7528fa2deb02a24a5398712a25c67a8770c75b792b6995a9f241b887754abe1aed5cf6c44d14d2db5ae8bb48b16dfe1a426e5a6d2b0b9a289cd0b7816d96bb95f97d58f4516e90cd781eea56625f26edc17819e2e88d512505eb5e3a05dfbef25974af7494b02637df9ce24e7a0e828d8be52f412d4f784324c097a1e458c692b0a25abe477011cadeca631003955bc2b8504daf84e665425a96e6723e8f21e3b56b404f517dcca7486e0be247e319df9c979a920a5ec08a6a07cbede2a1b4d965cd6caf32c4eb6901f7bc8e3d5395177efe21a6ccf145814ede149444b4ca38543d49ce29487eaf62fea5b81c06ab918e0e6d2b5f2e59641af86eed8b8de8f67be0ddfdadae57d267ec27961e722da68ce4fa44918c279a604b2bed91ffd0522aae10b5d15b3965efcddf352946c68a04a85c15bdcc58aaffe8f55a6d08e753c9bb0b4e72c4192dcc1fa90b52ec0aa66cd3e42bbe25d15e313bf6523efac2b23172bee9926b049ce9fb54c6f8b06be54fb830bfcb586e257617e43bb3f698fc6f44fe27b6f21d8481c637d4ea1023bdfac13257fba305a8a6216d53430a2138fcae5dd6f122f10404b62384afbb272adb01acde1ef98feb44802e106d1e7dbde8f71302e52015c99a5515271c988866ef03cc2670ffb4ba16752dc241656ae9a8f24aaf4125ec504ad118a63ceb1e1c2b86707746a967cf5e82ce166174f40e002f99fdbcf30f53ca19af131a2b336f6d432079b545f7a128895092c783ddf1b839e505a1e534516611d7297bf0556101f8cc6a34eaffcedc8babb32749159bff8885a9a803ce0229a25f1adf90cbdf38222e8166cca94f502b9ac67c28388fdf5701df3e506024f6b2661c18b98233898cebda533814f6eea272da01a6db4932368c8dc49e23b90e21509599b210db5ac9a21923512aaa554947a56ba5b61d3b43b58", 0x1000}, {&(0x7f0000003500)="08db78087cfb269f7f2b106814654524806ef62f029646ead80af7a86319e45316f7836dea81eff9c09a3183830425d633a8a31f7098fe33b390949c213a692ca938489952167ad382349f691df95b66846e7214347356eded3777bc5c1e50340b03d6a6506097b4480a5aab1945c8d8d695b960781b4def4992cd9e2634ea0bef9a8d5079df66c9b4cefd9e0b206f776832f7ab62bde4628a9ae5bc6f5b2a38a52cd7243c7b9d2ea939a5cb3d4c7f177d90a889fdaa8c88747b0161fcc3fbeaf012b77c1a938a", 0xc7}], 0x9, &(0x7f00000036c0)=[@assoc={0x18, 0x117, 0x4, 0xffffffffffffffc1}, @iv={0x118, 0x117, 0x2, 0xff, "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"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x8}, @op={0x18}, @op={0x18}, @iv={0xc0, 0x117, 0x2, 0xa8, "070710ef5366420687737e45e182f62c5e11e6b4e6a504dfcb4f77ee1769bdf1254c4c0d2c9f61b7a02febdc419bcd1642fb9eb605ca8b5b6514a536bc66fddd4851e3b8fb5098623c55dfeefada568c8c7f1fc44bf9346c4f0ca63405cfa373e48678286cfd0dc79bfcf486a2729e2e14cb19f42238b973b52ee21d54aada9dffd341a61afed39246b65e839fcc466cc1f0399d1b070ec45bff8ffe427acd159b57a5d0755864f2"}, @iv={0xe0, 0x117, 0x2, 0xc9, "6f62d96df5f03e80f063b84904ad10a2ee8303a3ed2a79f6651e5dfd9d005e0b810efdaa0434a81a220813e86a574c8a6ee5540a0e7ea2b5088fa7554ce7d33de65b121189ca21a10e5d8638b70effbd644ff02d6cb98731a52110af8796ca3c71b327818ecc4382ad1dfda0e8d1c4bffe5c5e129eb65cbc723d5a210540c81273d8087b756d40e0d6aa18f5ad515a64a03aeea2cf40417c5d47c099a50091e6fdff9bb249bbc213ef3b084fb14601fa81c28c1476c5485a07d4a8a29bcdd1597bfcf43b43582e2f8f"}, @assoc={0x18, 0x117, 0x4, 0x8000}], 0x348, 0x44001}, 0x4000804) msgrcv(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009177000000000000000000000000000000000000000000000000000000"], 0x253, 0xfffffffffffffffe, 0x0) r7 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$PPPIOCGMRU(r7, 0x80047453, &(0x7f0000000100)) 06:36:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:53 executing program 4 (fault-call:6 fault-nth:12): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:36:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0) 06:36:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="66696c62ff5ec160d66dd2ac5bba956bfee77465720000000000000000000000000000090000000000000000000000"], &(0x7f0000000680)=0x24) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0x8}, 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) [ 1095.348476] FAULT_INJECTION: forcing a failure. [ 1095.348476] name failslab, interval 1, probability 0, space 0, times 0 [ 1095.372337] CPU: 0 PID: 22626 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1095.379411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.388775] Call Trace: [ 1095.391366] dump_stack+0x244/0x39d 06:36:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000580)={'bpq0\x00', {0x2, 0x4e20, @multicast1}}) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) sendmsg$nl_xfrm(r2, &(0x7f0000000540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)=@polexpire={0x224, 0x1b, 0x200, 0x70bd2d, 0x25dfdbfd, {{{@in=@remote, @in6=@remote, 0x4e20, 0x0, 0x4e22, 0x1, 0x2, 0x80, 0x80, 0x33, 0x0, r3}, {0x5, 0x5, 0x4, 0x9, 0x7, 0x0, 0x3b6}, {0x0, 0x9, 0x1f, 0x3}, 0x8, 0x6e6bbc, 0x1, 0x1, 0x3, 0x3}, 0x1ff}, [@migrate={0x164, 0x11, [{@in, @in=@multicast2, 0xff, 0x3, 0x0, 0x3500, 0x0, 0xa}, {@in6, @in=@loopback, 0x7f, 0x4, 0x0, 0x0, 0xa, 0xa}, {@in=@remote, @in6=@remote, 0x6c, 0x4, 0x0, 0x3502, 0x0, 0xa}, {@in6=@mcast2, @in6, 0x3c, 0x3, 0x0, 0x3506, 0xa, 0x2}, {@in=@dev={0xac, 0x14, 0x14, 0x1b}, @in=@multicast2, 0x33, 0x4, 0x0, 0x3502, 0x0, 0x2}, {@in, @in6=@ipv4={[], [], @multicast2}, 0x3c, 0x3, 0x0, 0x0, 0x2, 0xa}, {@in=@rand_addr, @in6, 0x2b, 0x3, 0x0, 0x3503, 0x2, 0xa}, {@in=@local, @in6=@remote, 0x2b, 0x1, 0x0, 0x3507, 0xa}]}]}, 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) [ 1095.395031] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1095.400254] ? debug_smp_processor_id+0x1c/0x20 [ 1095.404938] ? perf_trace_lock+0x14d/0x7a0 [ 1095.404962] should_fail.cold.4+0xa/0x17 [ 1095.404985] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1095.413293] ? zap_class+0x640/0x640 [ 1095.413327] ? find_held_lock+0x36/0x1c0 [ 1095.422147] ? __lock_is_held+0xb5/0x140 [ 1095.422181] ? perf_trace_sched_process_exec+0x860/0x860 [ 1095.422201] ? kfree+0x1f8/0x230 [ 1095.439138] ? ida_alloc_range+0x953/0xc70 [ 1095.443396] __should_failslab+0x124/0x180 [ 1095.447650] should_failslab+0x9/0x14 [ 1095.451478] __kmalloc_track_caller+0x2d1/0x760 [ 1095.456173] ? kstrdup_const+0x66/0x80 [ 1095.460112] kstrdup+0x39/0x70 [ 1095.463323] kstrdup_const+0x66/0x80 [ 1095.467061] alloc_vfsmnt+0x186/0x990 [ 1095.470891] ? m_stop+0x20/0x20 [ 1095.474167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1095.479718] ? check_preemption_disabled+0x48/0x280 [ 1095.484740] ? debug_smp_processor_id+0x1c/0x20 [ 1095.489397] ? perf_trace_lock+0x14d/0x7a0 [ 1095.493624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1095.499167] ? check_preemption_disabled+0x48/0x280 [ 1095.504174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1095.509711] ? debug_smp_processor_id+0x1c/0x20 [ 1095.514391] ? perf_trace_lock+0x14d/0x7a0 [ 1095.518638] ? debug_smp_processor_id+0x1c/0x20 [ 1095.523321] ? perf_trace_lock+0x14d/0x7a0 [ 1095.527558] ? do_raw_spin_unlock+0xa7/0x330 [ 1095.531956] ? lock_is_held_type+0x210/0x210 [ 1095.536356] ? lock_is_held_type+0x210/0x210 [ 1095.540763] clone_mnt+0x124/0x13b0 [ 1095.544381] ? zap_class+0x640/0x640 [ 1095.548086] ? kern_mount_data+0xc0/0xc0 [ 1095.552151] ? find_held_lock+0x36/0x1c0 [ 1095.556211] ? copy_tree+0x65c/0xac0 [ 1095.559944] ? lock_downgrade+0x900/0x900 [ 1095.564141] ? lock_downgrade+0x900/0x900 [ 1095.568299] ? kasan_check_read+0x11/0x20 [ 1095.572448] ? do_raw_spin_unlock+0xa7/0x330 [ 1095.576858] ? do_raw_spin_trylock+0x270/0x270 [ 1095.581446] ? __is_local_mountpoint+0x200/0x200 [ 1095.586205] ? lock_release+0xa00/0xa00 [ 1095.590180] ? perf_trace_sched_process_exec+0x860/0x860 [ 1095.595624] copy_tree+0x485/0xac0 [ 1095.599180] ? to_mnt_ns+0x20/0x20 [ 1095.602710] ? down_read+0x120/0x120 [ 1095.606418] copy_mnt_ns+0x1dd/0xc00 [ 1095.610140] ? do_mount+0x31f0/0x31f0 [ 1095.613928] ? kmem_cache_alloc+0x33a/0x730 [ 1095.618261] create_new_namespaces+0x17b/0x900 [ 1095.622866] ? sys_ni_syscall+0x20/0x20 [ 1095.626836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1095.632378] ? ns_capable_common+0x13f/0x170 [ 1095.636776] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1095.641707] ksys_unshare+0x79c/0x10b0 [ 1095.645630] ? wait_for_completion+0x8a0/0x8a0 [ 1095.650202] ? walk_process_tree+0x440/0x440 [ 1095.654637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1095.660165] ? check_preemption_disabled+0x48/0x280 [ 1095.665196] ? __sb_end_write+0xd9/0x110 [ 1095.669263] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1095.674804] ? fput+0x130/0x1a0 [ 1095.678130] ? do_syscall_64+0x9a/0x820 [ 1095.682118] ? do_syscall_64+0x9a/0x820 [ 1095.686114] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1095.690712] ? trace_hardirqs_on+0xbd/0x310 [ 1095.695025] ? __ia32_sys_read+0xb0/0xb0 [ 1095.699080] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1095.704443] ? trace_hardirqs_off_caller+0x310/0x310 [ 1095.709551] __x64_sys_unshare+0x31/0x40 [ 1095.713605] do_syscall_64+0x1b9/0x820 [ 1095.717496] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1095.722851] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1095.727794] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1095.732642] ? trace_hardirqs_on_caller+0x310/0x310 [ 1095.737652] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1095.742659] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1095.747669] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1095.752508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1095.757698] RIP: 0033:0x457569 [ 1095.760893] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1095.779803] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1095.787509] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1095.794772] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1095.802040] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1095.809304] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1095.816576] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:53 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = msgget$private(0x0, 0x426) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) getgroups(0x3, &(0x7f0000000280)=[0xee00, 0xee00, 0xffffffffffffffff]) r5 = getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)=0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000300)={{0x2, r1, r2, r3, r4, 0x0, 0x3}, 0xffffffffffffff4b, 0x1, 0x4, 0xff, 0x1, 0x1, r5, r6}) 06:36:53 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0', [{}, {0x20, '!eth1'}], 0xa, "1d5d4166c98582777866da04ce241e01a9258399332d5558a8da8d3acb9f52e5f0217cb5a3f658c584b75e0dd15de589d5f697bf951e7b16765537f123c3040eef0c1184f66c092e9949c40d180de4ecb02809a3a0ee7e27c5abadb024efa31acce41ae6be7fda60d115fb7c4be48f5716a08e32fe8d39d0e15ff28124662ca25ddeb3bba5682070909f8a93e42c80de569eb70d99dcb8545ff468947f9eb90b6761fa9ff71c6fea0dd02a2ac3963caea7912ab8d6251b5e876e5dabf3ca19d037a57fa597a1928efaf399a828"}, 0xdf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:36:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572000000000400000000000000000000000000000000001600000000000000c9b6209a123e75f15a2d4bfd00202e3cfc"], &(0x7f0000000680)=0x24) accept$alg(r0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) [ 1095.828594] audit: type=1804 audit(1541054213.785:53): pid=22616 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir800681626/syzkaller.Rk8PfC/2742/file0" dev="sda1" ino=17661 res=1 [ 1095.865510] audit: type=1804 audit(1541054213.785:54): pid=22616 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir800681626/syzkaller.Rk8PfC/2742/file0" dev="sda1" ino=17661 res=1 06:36:53 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = msgget$private(0x0, 0x2) msgsnd(r0, &(0x7f0000000000)={0x2, "50c3565e2e43bb0fb674dac9d9a0d7d03c52"}, 0x1a, 0x800) 06:36:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068a0", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast1, @multicast2}, &(0x7f0000000280)=0xc) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:36:53 executing program 4 (fault-call:6 fault-nth:13): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) [ 1096.069446] FAULT_INJECTION: forcing a failure. [ 1096.069446] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.086320] CPU: 0 PID: 22659 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1096.093353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.102711] Call Trace: [ 1096.105329] dump_stack+0x244/0x39d [ 1096.108973] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1096.114181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1096.119730] ? check_preemption_disabled+0x48/0x280 [ 1096.124774] should_fail.cold.4+0xa/0x17 [ 1096.128859] ? print_usage_bug+0xc0/0xc0 [ 1096.132956] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1096.138053] ? zap_class+0x640/0x640 [ 1096.141777] ? __lock_acquire+0x62f/0x4c20 [ 1096.145997] ? find_held_lock+0x36/0x1c0 [ 1096.150062] ? __lock_is_held+0xb5/0x140 [ 1096.154132] ? perf_trace_sched_process_exec+0x860/0x860 [ 1096.159570] ? print_usage_bug+0xc0/0xc0 [ 1096.163622] __should_failslab+0x124/0x180 [ 1096.167844] should_failslab+0x9/0x14 [ 1096.171632] kmem_cache_alloc+0x2be/0x730 [ 1096.175776] alloc_vfsmnt+0xe9/0x990 [ 1096.179476] ? zap_class+0x640/0x640 [ 1096.183174] ? m_stop+0x20/0x20 [ 1096.186447] ? mark_held_locks+0x130/0x130 [ 1096.190666] ? find_held_lock+0x36/0x1c0 [ 1096.194717] ? clone_mnt+0x4c1/0x13b0 [ 1096.198506] ? lock_downgrade+0x900/0x900 [ 1096.202638] ? lock_downgrade+0x900/0x900 [ 1096.206773] ? zap_class+0x640/0x640 [ 1096.210484] ? do_raw_spin_unlock+0xa7/0x330 [ 1096.214887] ? do_raw_spin_trylock+0x270/0x270 [ 1096.219484] clone_mnt+0x124/0x13b0 [ 1096.223125] ? zap_class+0x640/0x640 [ 1096.226831] ? kern_mount_data+0xc0/0xc0 [ 1096.230888] ? lockref_get+0x42/0x50 [ 1096.234593] ? find_held_lock+0x36/0x1c0 [ 1096.238710] ? copy_tree+0x65c/0xac0 [ 1096.242433] ? lock_downgrade+0x900/0x900 [ 1096.246573] ? lock_downgrade+0x900/0x900 [ 1096.250714] ? kasan_check_read+0x11/0x20 [ 1096.254849] ? do_raw_spin_unlock+0xa7/0x330 [ 1096.259245] ? do_raw_spin_trylock+0x270/0x270 [ 1096.263817] ? __is_local_mountpoint+0x200/0x200 [ 1096.268563] ? lock_release+0xa00/0xa00 [ 1096.272527] ? perf_trace_sched_process_exec+0x860/0x860 [ 1096.277979] copy_tree+0x485/0xac0 [ 1096.281512] ? to_mnt_ns+0x20/0x20 [ 1096.285052] ? down_read+0x120/0x120 [ 1096.288776] copy_mnt_ns+0x1dd/0xc00 [ 1096.292497] ? do_mount+0x31f0/0x31f0 [ 1096.296287] ? kmem_cache_alloc+0x33a/0x730 [ 1096.300601] create_new_namespaces+0x17b/0x900 [ 1096.305178] ? sys_ni_syscall+0x20/0x20 [ 1096.309145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1096.314669] ? ns_capable_common+0x13f/0x170 [ 1096.319066] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1096.323984] ksys_unshare+0x79c/0x10b0 [ 1096.327858] ? wait_for_completion+0x8a0/0x8a0 [ 1096.332427] ? walk_process_tree+0x440/0x440 [ 1096.336825] ? __lock_is_held+0xb5/0x140 [ 1096.340877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1096.346404] ? check_preemption_disabled+0x48/0x280 [ 1096.351416] ? __sb_end_write+0xd9/0x110 [ 1096.355466] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1096.360992] ? fput+0x130/0x1a0 [ 1096.364263] ? do_syscall_64+0x9a/0x820 [ 1096.368227] ? do_syscall_64+0x9a/0x820 [ 1096.372192] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1096.376768] ? trace_hardirqs_on+0xbd/0x310 [ 1096.381090] ? __ia32_sys_read+0xb0/0xb0 [ 1096.385156] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1096.390509] ? trace_hardirqs_off_caller+0x310/0x310 [ 1096.395617] __x64_sys_unshare+0x31/0x40 [ 1096.399669] do_syscall_64+0x1b9/0x820 [ 1096.403550] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1096.408903] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1096.413822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1096.418651] ? trace_hardirqs_on_caller+0x310/0x310 [ 1096.423655] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1096.428690] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1096.433699] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1096.438532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1096.443707] RIP: 0033:0x457569 [ 1096.446903] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1096.465807] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1096.473512] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1096.480794] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1096.488072] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1096.495341] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1096.502647] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x2c00c0, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) 06:36:54 executing program 2: msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="003d17000000000000000000000000000000000000000000000000000000000000000000000000000000000000a20b00000000000000000000000000000000f0000000000000001800000000000000000000000000000000000000000000000000000000000000000f000000000000000000947534c8d247da2fc31b024b420641224a8e176413a1f67fe669a4604763842ffb4c606d6c48c0215ab240e0b816a65d6b4789fe5b3d732f15916ec6783c0291a03e3bb830ece52ed8ff69e4540f7f48b22cc3e6ea826278a06174970120b9e6b7917dc0fcdfee798bc18b098aa34c247448fb5e4c45d9253038781b97ea08aa83dec91bb54f75a62213210330bf"], 0x72, 0x0, 0x0) 06:36:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x80, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x7, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:36:54 executing program 4 (fault-call:6 fault-nth:14): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:36:54 executing program 2: r0 = msgget$private(0x0, 0x400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40001, 0x0) accept$packet(r1, &(0x7f00000001c0), &(0x7f0000000240)=0x14) msgrcv(r0, &(0x7f0000000200)=ANY=[@ANYRES32], 0x1, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000180)={'team0\x00', r4}) socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000001780)={@local, @local, r5}, 0xc) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x4000, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x3) ioctl$VHOST_RESET_OWNER(r6, 0xaf02, 0x0) [ 1096.704687] FAULT_INJECTION: forcing a failure. [ 1096.704687] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.728178] CPU: 1 PID: 22680 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1096.735225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.744581] Call Trace: [ 1096.744615] dump_stack+0x244/0x39d [ 1096.744641] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1096.744675] should_fail.cold.4+0xa/0x17 [ 1096.744700] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1096.750916] ? zap_class+0x640/0x640 [ 1096.750933] ? zap_class+0x640/0x640 [ 1096.750960] ? find_held_lock+0x36/0x1c0 [ 1096.750982] ? __lock_is_held+0xb5/0x140 [ 1096.751014] ? perf_trace_sched_process_exec+0x860/0x860 [ 1096.786322] ? kfree+0x1f8/0x230 [ 1096.789703] ? ida_alloc_range+0x953/0xc70 [ 1096.793968] __should_failslab+0x124/0x180 [ 1096.798224] should_failslab+0x9/0x14 [ 1096.802043] __kmalloc_track_caller+0x2d1/0x760 [ 1096.806744] ? kstrdup_const+0x66/0x80 [ 1096.810657] kstrdup+0x39/0x70 [ 1096.813869] kstrdup_const+0x66/0x80 [ 1096.817597] alloc_vfsmnt+0x186/0x990 [ 1096.821420] ? m_stop+0x20/0x20 [ 1096.824746] ? mark_held_locks+0x130/0x130 [ 1096.828996] ? find_held_lock+0x36/0x1c0 [ 1096.833083] ? clone_mnt+0x4c1/0x13b0 [ 1096.836908] ? lock_downgrade+0x900/0x900 [ 1096.841067] ? lock_downgrade+0x900/0x900 [ 1096.845255] ? zap_class+0x640/0x640 [ 1096.848980] ? do_raw_spin_unlock+0xa7/0x330 [ 1096.853424] ? do_raw_spin_trylock+0x270/0x270 [ 1096.858040] clone_mnt+0x124/0x13b0 [ 1096.861689] ? zap_class+0x640/0x640 [ 1096.865420] ? kern_mount_data+0xc0/0xc0 [ 1096.869489] ? lockref_get+0x42/0x50 [ 1096.873225] ? find_held_lock+0x36/0x1c0 [ 1096.877311] ? copy_tree+0x65c/0xac0 [ 1096.881037] ? lock_downgrade+0x900/0x900 [ 1096.885197] ? lock_downgrade+0x900/0x900 [ 1096.889362] ? kasan_check_read+0x11/0x20 [ 1096.893522] ? do_raw_spin_unlock+0xa7/0x330 [ 1096.897938] ? do_raw_spin_trylock+0x270/0x270 [ 1096.902530] ? __is_local_mountpoint+0x200/0x200 [ 1096.907299] ? lock_release+0xa00/0xa00 [ 1096.911279] ? perf_trace_sched_process_exec+0x860/0x860 [ 1096.916748] copy_tree+0x485/0xac0 [ 1096.920315] ? to_mnt_ns+0x20/0x20 [ 1096.923862] ? down_read+0x120/0x120 [ 1096.927599] copy_mnt_ns+0x1dd/0xc00 [ 1096.931343] ? do_mount+0x31f0/0x31f0 [ 1096.935201] ? kmem_cache_alloc+0x33a/0x730 [ 1096.939550] create_new_namespaces+0x17b/0x900 [ 1096.944159] ? sys_ni_syscall+0x20/0x20 [ 1096.948162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1096.953744] ? ns_capable_common+0x13f/0x170 [ 1096.958168] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1096.963119] ksys_unshare+0x79c/0x10b0 [ 1096.967025] ? wait_for_completion+0x8a0/0x8a0 [ 1096.971622] ? walk_process_tree+0x440/0x440 [ 1096.976042] ? __lock_is_held+0xb5/0x140 [ 1096.980133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1096.985682] ? check_preemption_disabled+0x48/0x280 [ 1096.990733] ? __sb_end_write+0xd9/0x110 [ 1096.994823] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1097.000366] ? fput+0x130/0x1a0 [ 1097.003655] ? do_syscall_64+0x9a/0x820 [ 1097.007640] ? do_syscall_64+0x9a/0x820 [ 1097.011630] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1097.016228] ? trace_hardirqs_on+0xbd/0x310 [ 1097.020558] ? __ia32_sys_read+0xb0/0xb0 [ 1097.024633] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1097.030009] ? trace_hardirqs_off_caller+0x310/0x310 [ 1097.035155] __x64_sys_unshare+0x31/0x40 [ 1097.039230] do_syscall_64+0x1b9/0x820 [ 1097.043130] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1097.048521] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1097.053459] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1097.058312] ? trace_hardirqs_on_caller+0x310/0x310 [ 1097.063342] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1097.068368] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1097.073399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1097.078262] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1097.083458] RIP: 0033:0x457569 [ 1097.086667] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:36:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) 06:36:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000340)='./file0\x00', 0x1a6) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000380)={0x3, 0xc737}) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x4) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x5, 0x8000, 0x0, 0x5, 0x8, 0x0, 0x3a, {0x0, @in6={{0xa, 0x4e20, 0x2, @remote, 0x100}}, 0x2, 0x3, 0x7fff, 0x8, 0xfffffffffffff293}}, &(0x7f0000000180)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f00000001c0)={r4, 0x1}, 0x8) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) socket$alg(0x26, 0x5, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1097.105574] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1097.113292] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1097.120578] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1097.127855] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1097.135145] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1097.142593] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e00000000000000000000000000000e00000000000000000000000000000000000000007a5ab092c4d7b0563935be"], 0x72, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) 06:36:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:55 executing program 4 (fault-call:6 fault-nth:15): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:36:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) [ 1097.444025] FAULT_INJECTION: forcing a failure. [ 1097.444025] name failslab, interval 1, probability 0, space 0, times 0 [ 1097.477215] CPU: 1 PID: 22703 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1097.484254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.493614] Call Trace: [ 1097.496214] dump_stack+0x244/0x39d [ 1097.499867] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1097.505084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1097.510647] ? check_preemption_disabled+0x48/0x280 [ 1097.515714] should_fail.cold.4+0xa/0x17 [ 1097.519784] ? print_usage_bug+0xc0/0xc0 [ 1097.523857] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1097.528991] ? zap_class+0x640/0x640 [ 1097.532720] ? __lock_acquire+0x62f/0x4c20 [ 1097.536977] ? find_held_lock+0x36/0x1c0 [ 1097.541063] ? __lock_is_held+0xb5/0x140 [ 1097.545192] ? mlx4_GEN_QP_wrapper+0xb8/0x220 [ 1097.549723] ? perf_trace_sched_process_exec+0x860/0x860 [ 1097.555180] ? print_usage_bug+0xc0/0xc0 [ 1097.559263] __should_failslab+0x124/0x180 [ 1097.563508] should_failslab+0x9/0x14 [ 1097.567317] kmem_cache_alloc+0x2be/0x730 [ 1097.571489] alloc_vfsmnt+0xe9/0x990 [ 1097.575239] ? zap_class+0x640/0x640 [ 1097.578961] ? m_stop+0x20/0x20 [ 1097.582278] ? mark_held_locks+0x130/0x130 [ 1097.586523] ? find_held_lock+0x36/0x1c0 [ 1097.590616] ? clone_mnt+0x4c1/0x13b0 [ 1097.594429] ? lock_downgrade+0x900/0x900 [ 1097.598584] ? lock_downgrade+0x900/0x900 [ 1097.602749] ? zap_class+0x640/0x640 [ 1097.606470] ? do_raw_spin_unlock+0xa7/0x330 [ 1097.610915] ? do_raw_spin_trylock+0x270/0x270 [ 1097.615536] clone_mnt+0x124/0x13b0 [ 1097.619176] ? zap_class+0x640/0x640 [ 1097.622910] ? kern_mount_data+0xc0/0xc0 [ 1097.626980] ? lockref_get+0x42/0x50 [ 1097.630707] ? find_held_lock+0x36/0x1c0 [ 1097.634796] ? copy_tree+0x65c/0xac0 [ 1097.638520] ? lock_downgrade+0x900/0x900 [ 1097.642675] ? lock_downgrade+0x900/0x900 [ 1097.646839] ? kasan_check_read+0x11/0x20 [ 1097.650998] ? do_raw_spin_unlock+0xa7/0x330 [ 1097.655444] ? do_raw_spin_trylock+0x270/0x270 [ 1097.660035] ? __is_local_mountpoint+0x200/0x200 [ 1097.664800] ? lock_release+0xa00/0xa00 [ 1097.668790] ? perf_trace_sched_process_exec+0x860/0x860 [ 1097.674257] copy_tree+0x485/0xac0 [ 1097.677816] ? to_mnt_ns+0x20/0x20 [ 1097.681361] ? down_read+0x120/0x120 [ 1097.685119] copy_mnt_ns+0x1dd/0xc00 [ 1097.688856] ? do_mount+0x31f0/0x31f0 [ 1097.692662] ? kmem_cache_alloc+0x33a/0x730 [ 1097.697002] create_new_namespaces+0x17b/0x900 [ 1097.701600] ? sys_ni_syscall+0x20/0x20 [ 1097.705628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1097.711177] ? ns_capable_common+0x13f/0x170 [ 1097.715600] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1097.720547] ksys_unshare+0x79c/0x10b0 [ 1097.724440] ? wait_for_completion+0x8a0/0x8a0 [ 1097.729031] ? walk_process_tree+0x440/0x440 [ 1097.733448] ? __lock_is_held+0xb5/0x140 [ 1097.737527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1097.743076] ? check_preemption_disabled+0x48/0x280 [ 1097.748125] ? __sb_end_write+0xd9/0x110 [ 1097.752202] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1097.757745] ? fput+0x130/0x1a0 [ 1097.761031] ? do_syscall_64+0x9a/0x820 [ 1097.765014] ? do_syscall_64+0x9a/0x820 [ 1097.768994] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1097.773587] ? trace_hardirqs_on+0xbd/0x310 [ 1097.777916] ? __ia32_sys_read+0xb0/0xb0 [ 1097.781984] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1097.787359] ? trace_hardirqs_off_caller+0x310/0x310 [ 1097.792482] __x64_sys_unshare+0x31/0x40 [ 1097.796557] do_syscall_64+0x1b9/0x820 [ 1097.800454] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1097.805825] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1097.810763] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1097.815618] ? trace_hardirqs_on_caller+0x310/0x310 [ 1097.820648] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1097.825689] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1097.830721] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1097.835586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1097.840789] RIP: 0033:0x457569 [ 1097.843991] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1097.862899] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1097.870615] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1097.877897] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1097.885168] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1097.892440] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1097.899735] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/packet\x00') r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept$alg(r0, 0x0, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000540)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000640)=0xe8) sendto(r4, &(0x7f0000000180)="6a6d7ba59b3eb188f7b412b99c4b75d6bc9b460fc256b5ccc508c659b91afbf7f8a6b8be37f470adc9c1de06b20d8809ef999f6b25e0d220f225889f684402fb4857d04e28df43c90ecd4bb85e7212483b1df80a3a0faf23ea55a8727b311ad8922d26c0ea", 0x65, 0x800, &(0x7f0000000680)=@xdp={0x2c, 0x0, r5, 0x14}, 0x80) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:36:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080), &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340), 0x10) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x200000000000000, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000001c0), 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000580)) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000400), &(0x7f00000004c0)=0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[]}}, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001840)={0x0, @loopback}, &(0x7f0000001880)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000840)={0x0, @in6={{0xa, 0x4e23, 0x0, @mcast2, 0x6}}}, &(0x7f0000000900)=0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000940)=@assoc_value={0x0}, &(0x7f0000000980)=0x8) sendmsg$inet_sctp(r5, &(0x7f0000000a80)={&(0x7f0000000680)=@in={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000000800)=[{&(0x7f00000006c0)="41b5f630b9af1e8d86a991b9d49b8b2586c4eef0d5d7aa1caacae14e08dc147433608f0646148e3bf3edd40086f38e6ae0065a66b4b077ebeedde036232a152bfce7cb6953dccff4199150ff2bf0ad1c6f8ed708792785b8180e68504ff41ec5a17689cf2d1fc54bb3e3a00e638c31a396b192b2e3d98d7118c3442c2056741a08f635be3ccee38fcb349151d7ba5e9ca8b7ed3478146f43cf8bdbedec51e0ff52ccaabc7d20685c93bba3e94fb35cec84d676643198beb95367964c7cb6648f7880546c908c1b22dc5b3eb0f69e1fce98569cca9b9e38b95e6f1d2a5690fd17a0f185de00604bb406e527e33baa2e2c5f1b58aa8397aab5", 0xf8}, {&(0x7f00000007c0)="c7268b818fdf1ed17b34600185bd7a985a9b403803f55fdaeaf6d0a126fa7e", 0x1f}], 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="200000005046c7af4c9d2f000f0000d3614c429d10039cee86591367b5e87ca01d4a058af50a907536a4b9eb995433908768242d2635bfa55afabaaeec8a644c0dfc40c8d331282229ff15f41064f174b71890c69f533cc5b98949328cad19fda08ca516ccad2cd33e73567dbe84de5b25f1f1ea0951eeae98bde9e393ef6d6ea594cd785fd63b1bf18b45874680669457c698048f08da3d8a3efa10ef4be194c663f949a78d0d0012db1f00ad6955291061ab74f2e1ffe823ca7b", @ANYRES32=r7, @ANYBLOB="20000000000000008400000008000000fe8000000000000000000000000000aa1800000000000000840000000600000005000000000000003000000000000000840000000100000020000200090000000000000075090000000200000900000004000000", @ANYRES32=r8], 0x88, 0x8000}, 0x10) r9 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="dd3dbf081505d02f0e9115994c332eb29d943b1062d4d7da7dceb69c6f1ffa955a5bc78cd61901ca7c0e36c6bb0c43b7b97be17dcba7837f071528f0ace1167b4ebce26440161d95883132f0df358279940fe94e3e25b3b415b4337f595722", 0x5f, 0xfffffffffffffffa) r10 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x44100, 0x0) connect$llc(r10, &(0x7f0000000640)={0x1a, 0x30f, 0x8, 0x400, 0x200, 0x7, @local}, 0x10) r11 = request_key(&(0x7f0000000240)='rxrpc\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="776c616e31245b747275737465645b6d643573756d6b657972696e6773656c696e75786e6f6465766e6f6465766c6f7d6b657972696e672bd500", 0xffffffffffffffff) r12 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='lo\x00', 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r9, r11, r12}, &(0x7f0000000400)=""/108, 0x6c, &(0x7f00000005c0)={&(0x7f0000000480)={'hmac(speck64)\x00'}, &(0x7f00000004c0)="cdeee227e81f596f6413da0ec94ca5f5062408bca7422f30f9d8200e01b2bf3a7dae63a32b94668ba97b43a48a5ca40fb56e1f5e8a2ec6ad5f2ec5c46308f3ee83533e55a1e3c3760ac2be6b9447829aa303a58fd1b4e8f55450d63791498e31ee152244679e9b0365dde706aa66679d2d108f28357369e8da8a017a5e4bb773952f59cebef10972123515af9ca659c09b0a2bfe7fb5ee71ce512041c2d9b7341522f001f8c8afd1c58fe843eff56a422d971dd4bff1da985cd9e0d001346e2d63ec7f97ed745f9f306f7bbf3caf14334cee787d5d392a553fc90eae5e22c14f7d643f5f", 0xe4}) recvfrom(r4, &(0x7f0000000100)=""/118, 0x76, 0x0, &(0x7f00000018c0)=@ll={0x11, 0x1b, r6}, 0x80) 06:36:55 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) fcntl$notify(r0, 0x402, 0x1) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000bd04ffff00002258ffffff"], &(0x7f0000000680)=0x24) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r2, 0xc0285629, &(0x7f00000000c0)={0x3, 0x0, 0x10, [], &(0x7f0000000080)}) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000300)={0x15, 0xe4, &(0x7f0000000200)="97f615f14bfe55e55b34f341bfb93f6946ff199a8f0d2176780df11302fc0f4caa472fea33539894eb80696124d86fa52429c84a5590c211f48a54972e798e13db70d1d5da11378ea749c35cba62d5fa712dd0fa46faee27595cea5c7a7ba4f98a5946090491daf6165f1598185a2e92b55847885c3660f50650f519f095c22cfacc21c16a55330cdb96ed16587696cbbc2f33ae1b7444412fc16d666bdb5f8bf292fd0c459b82642c74b057f522f98c62cea2ff966fd321f4191e4a21d4f8e586363ee011de05a3a20d0a3609a18c62bf3ff3e56f69028a2dc67137137895c6b45ff026"}) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) 06:36:56 executing program 4 (fault-call:6 fault-nth:16): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:36:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)={0x3}, 0x8, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000040)={0x7000, 0x104000}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x20000000000008, 0x0) [ 1098.051389] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1098.065156] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1098.132349] FAULT_INJECTION: forcing a failure. [ 1098.132349] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.158044] CPU: 0 PID: 22725 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1098.165138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.169667] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1098.174497] Call Trace: [ 1098.174524] dump_stack+0x244/0x39d [ 1098.174548] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1098.174584] should_fail.cold.4+0xa/0x17 [ 1098.174610] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1098.201685] ? zap_class+0x640/0x640 [ 1098.205431] ? zap_class+0x640/0x640 [ 1098.209221] ? find_held_lock+0x36/0x1c0 [ 1098.213297] ? __lock_is_held+0xb5/0x140 [ 1098.217393] ? perf_trace_sched_process_exec+0x860/0x860 [ 1098.222863] ? kfree+0x1f8/0x230 [ 1098.226249] ? ida_alloc_range+0x953/0xc70 [ 1098.230503] __should_failslab+0x124/0x180 [ 1098.234760] should_failslab+0x9/0x14 [ 1098.238576] __kmalloc_track_caller+0x2d1/0x760 [ 1098.243272] ? kstrdup_const+0x66/0x80 [ 1098.247179] kstrdup+0x39/0x70 [ 1098.250385] kstrdup_const+0x66/0x80 [ 1098.254136] alloc_vfsmnt+0x186/0x990 [ 1098.257957] ? m_stop+0x20/0x20 [ 1098.261265] ? mark_held_locks+0x130/0x130 [ 1098.265506] ? find_held_lock+0x36/0x1c0 [ 1098.265532] ? clone_mnt+0x4c1/0x13b0 [ 1098.265553] ? lock_downgrade+0x900/0x900 [ 1098.277541] ? lock_downgrade+0x900/0x900 [ 1098.281706] ? zap_class+0x640/0x640 [ 1098.285461] ? do_raw_spin_unlock+0xa7/0x330 [ 1098.289881] ? do_raw_spin_trylock+0x270/0x270 [ 1098.294493] clone_mnt+0x124/0x13b0 [ 1098.298150] ? zap_class+0x640/0x640 [ 1098.301882] ? kern_mount_data+0xc0/0xc0 [ 1098.305957] ? lockref_get+0x42/0x50 [ 1098.309687] ? find_held_lock+0x36/0x1c0 [ 1098.313767] ? copy_tree+0x65c/0xac0 [ 1098.317496] ? lock_downgrade+0x900/0x900 [ 1098.321658] ? lock_downgrade+0x900/0x900 [ 1098.325821] ? kasan_check_read+0x11/0x20 [ 1098.329993] ? do_raw_spin_unlock+0xa7/0x330 [ 1098.334414] ? do_raw_spin_trylock+0x270/0x270 [ 1098.339011] ? __is_local_mountpoint+0x200/0x200 [ 1098.343803] ? lock_release+0xa00/0xa00 [ 1098.347799] ? perf_trace_sched_process_exec+0x860/0x860 [ 1098.353272] copy_tree+0x485/0xac0 [ 1098.356845] ? to_mnt_ns+0x20/0x20 [ 1098.360412] ? down_read+0x120/0x120 [ 1098.364162] copy_mnt_ns+0x1dd/0xc00 [ 1098.367908] ? do_mount+0x31f0/0x31f0 [ 1098.371743] ? kmem_cache_alloc+0x33a/0x730 [ 1098.376064] create_new_namespaces+0x17b/0x900 [ 1098.380659] ? sys_ni_syscall+0x20/0x20 [ 1098.384642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1098.390171] ? ns_capable_common+0x13f/0x170 [ 1098.394569] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1098.399501] ksys_unshare+0x79c/0x10b0 [ 1098.403381] ? wait_for_completion+0x8a0/0x8a0 [ 1098.407957] ? walk_process_tree+0x440/0x440 [ 1098.412367] ? __lock_is_held+0xb5/0x140 [ 1098.416435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1098.421965] ? check_preemption_disabled+0x48/0x280 [ 1098.426976] ? __sb_end_write+0xd9/0x110 [ 1098.431028] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1098.436557] ? fput+0x130/0x1a0 [ 1098.439837] ? do_syscall_64+0x9a/0x820 [ 1098.443800] ? do_syscall_64+0x9a/0x820 [ 1098.447772] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1098.452360] ? trace_hardirqs_on+0xbd/0x310 [ 1098.456685] ? __ia32_sys_read+0xb0/0xb0 [ 1098.460737] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1098.466115] ? trace_hardirqs_off_caller+0x310/0x310 [ 1098.471226] __x64_sys_unshare+0x31/0x40 [ 1098.475279] do_syscall_64+0x1b9/0x820 [ 1098.479163] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1098.484529] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1098.489445] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1098.494291] ? trace_hardirqs_on_caller+0x310/0x310 [ 1098.499316] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1098.504348] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1098.509397] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1098.514245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1098.519428] RIP: 0033:0x457569 [ 1098.522628] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1098.541529] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1098.549230] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1098.556486] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1098.563757] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1098.571011] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 06:36:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x4}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000002c0)={r2, 0x2, 0x1}, 0x8) r3 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:36:56 executing program 2: msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x72, 0x0, 0x0) 06:36:56 executing program 2: msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000"], 0x72, 0x0, 0x0) r0 = msgget$private(0x0, 0x100) msgsnd(r0, &(0x7f0000000100)={0x0, "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"}, 0x1008, 0x800) [ 1098.578270] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:58 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x20000) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x7f}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r1, 0x800}, &(0x7f0000000180)=0x8) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) 06:36:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000680)=0x24) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) 06:36:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:36:58 executing program 4 (fault-call:6 fault-nth:17): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:36:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068f0", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1100.516301] FAULT_INJECTION: forcing a failure. [ 1100.516301] name failslab, interval 1, probability 0, space 0, times 0 [ 1100.541509] CPU: 1 PID: 22762 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1100.548550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.557908] Call Trace: [ 1100.560514] dump_stack+0x244/0x39d [ 1100.564176] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1100.569395] ? debug_smp_processor_id+0x1c/0x20 [ 1100.574098] ? perf_trace_lock+0x14d/0x7a0 [ 1100.578373] should_fail.cold.4+0xa/0x17 [ 1100.582460] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1100.587602] ? zap_class+0x640/0x640 [ 1100.591353] ? __lock_acquire+0x62f/0x4c20 [ 1100.595620] ? find_held_lock+0x36/0x1c0 [ 1100.599706] ? __lock_is_held+0xb5/0x140 [ 1100.603797] ? perf_trace_sched_process_exec+0x860/0x860 [ 1100.609263] ? print_usage_bug+0xc0/0xc0 [ 1100.613340] ? check_preemption_disabled+0x48/0x280 [ 1100.618382] __should_failslab+0x124/0x180 [ 1100.622640] should_failslab+0x9/0x14 [ 1100.626459] kmem_cache_alloc+0x2be/0x730 [ 1100.630642] alloc_vfsmnt+0xe9/0x990 [ 1100.634378] ? zap_class+0x640/0x640 [ 1100.638125] ? m_stop+0x20/0x20 [ 1100.641427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1100.646979] ? check_preemption_disabled+0x48/0x280 [ 1100.652019] ? debug_smp_processor_id+0x1c/0x20 [ 1100.656704] ? perf_trace_lock+0x14d/0x7a0 [ 1100.660962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1100.666514] ? check_preemption_disabled+0x48/0x280 [ 1100.671551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1100.677117] ? debug_smp_processor_id+0x1c/0x20 [ 1100.681799] ? perf_trace_lock+0x14d/0x7a0 [ 1100.686060] ? debug_smp_processor_id+0x1c/0x20 [ 1100.690741] ? perf_trace_lock+0x14d/0x7a0 [ 1100.694989] ? do_raw_spin_unlock+0xa7/0x330 [ 1100.699412] ? lock_is_held_type+0x210/0x210 [ 1100.703837] ? lock_is_held_type+0x210/0x210 [ 1100.708284] clone_mnt+0x124/0x13b0 [ 1100.711926] ? zap_class+0x640/0x640 [ 1100.715662] ? kern_mount_data+0xc0/0xc0 [ 1100.719744] ? find_held_lock+0x36/0x1c0 [ 1100.723827] ? copy_tree+0x65c/0xac0 [ 1100.727557] ? lock_downgrade+0x900/0x900 [ 1100.731723] ? lock_downgrade+0x900/0x900 [ 1100.735923] ? kasan_check_read+0x11/0x20 [ 1100.740085] ? do_raw_spin_unlock+0xa7/0x330 [ 1100.744515] ? do_raw_spin_trylock+0x270/0x270 [ 1100.749123] ? __is_local_mountpoint+0x200/0x200 [ 1100.753897] ? lock_release+0xa00/0xa00 [ 1100.757885] ? perf_trace_sched_process_exec+0x860/0x860 [ 1100.763360] copy_tree+0x485/0xac0 [ 1100.766938] ? to_mnt_ns+0x20/0x20 [ 1100.770487] ? down_read+0x120/0x120 [ 1100.774230] copy_mnt_ns+0x1dd/0xc00 [ 1100.777969] ? do_mount+0x31f0/0x31f0 [ 1100.781778] ? kmem_cache_alloc+0x33a/0x730 [ 1100.786134] create_new_namespaces+0x17b/0x900 [ 1100.790751] ? sys_ni_syscall+0x20/0x20 [ 1100.794744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1100.800297] ? ns_capable_common+0x13f/0x170 [ 1100.804722] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1100.809684] ksys_unshare+0x79c/0x10b0 [ 1100.813627] ? wait_for_completion+0x8a0/0x8a0 [ 1100.818229] ? walk_process_tree+0x440/0x440 [ 1100.822676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1100.828227] ? check_preemption_disabled+0x48/0x280 [ 1100.828253] ? __sb_end_write+0xd9/0x110 [ 1100.828275] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1100.842879] ? fput+0x130/0x1a0 [ 1100.842912] ? do_syscall_64+0x9a/0x820 [ 1100.842929] ? do_syscall_64+0x9a/0x820 [ 1100.842947] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1100.842971] ? trace_hardirqs_on+0xbd/0x310 [ 1100.850251] ? __ia32_sys_read+0xb0/0xb0 [ 1100.850269] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1100.850286] ? trace_hardirqs_off_caller+0x310/0x310 [ 1100.850312] __x64_sys_unshare+0x31/0x40 [ 1100.850330] do_syscall_64+0x1b9/0x820 [ 1100.850347] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1100.850371] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1100.895894] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1100.900734] ? trace_hardirqs_on_caller+0x310/0x310 [ 1100.905753] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1100.910773] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1100.915780] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1100.920634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1100.925810] RIP: 0033:0x457569 [ 1100.929001] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1100.947899] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1100.955624] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 06:36:58 executing program 3: r0 = dup(0xffffffffffffff9c) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000280)={0x0, 0x1, [], {0x0, @reserved}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1100.962899] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1100.970168] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1100.977430] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1100.984715] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, &(0x7f0000000180)={0x1, 0x49dd, {0x100, 0x80, 0x3, 0x6}}) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:36:59 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setregs(0xf, r1, 0x3, &(0x7f0000000100)="2b154cf725b69b74027df554f8b979b4f9835c8387e204e016d683d2e65f61b42f706fbc7763b4f390a00d1bdba3114a7dc4b6a5f74684d42bef101e594db475fcd5efb4f82ce98946f34aba72f67aa07f1271f68b93879dfc6700e088c6606a64c249861e51196ca59cdf8832b46d76548df9994c23a5c8b13c1dff45d9fc980d9428c91965eec751f4ea0844bdea73793c060a1a0ac2c32c53717ad20fd3a5e30211c39f08edd3e05d46e6df466b926fb91eae9de94d20eaee7d1fc3c26730e264ecdd71ffc76ec7627abeedbe2586fb0683bf5c38c6fc893be417018917cce004c5") 06:36:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000180)=0x5, 0x4) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:36:59 executing program 4 (fault-call:6 fault-nth:18): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) [ 1101.252153] FAULT_INJECTION: forcing a failure. [ 1101.252153] name failslab, interval 1, probability 0, space 0, times 0 [ 1101.279733] CPU: 1 PID: 22793 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1101.286778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.296155] Call Trace: [ 1101.298764] dump_stack+0x244/0x39d [ 1101.302427] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1101.307656] should_fail.cold.4+0xa/0x17 [ 1101.311740] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1101.316876] ? zap_class+0x640/0x640 [ 1101.320663] ? zap_class+0x640/0x640 [ 1101.324438] ? find_held_lock+0x36/0x1c0 [ 1101.328519] ? __lock_is_held+0xb5/0x140 [ 1101.332714] ? ppp_asynctty_ioctl+0x228/0x2f0 [ 1101.337261] ? perf_trace_sched_process_exec+0x860/0x860 [ 1101.342717] ? kfree+0x1f8/0x230 [ 1101.346069] ? ida_alloc_range+0x953/0xc70 [ 1101.350291] __should_failslab+0x124/0x180 [ 1101.354524] should_failslab+0x9/0x14 [ 1101.358310] __kmalloc_track_caller+0x2d1/0x760 [ 1101.362968] ? kstrdup_const+0x66/0x80 [ 1101.366846] kstrdup+0x39/0x70 [ 1101.370028] kstrdup_const+0x66/0x80 [ 1101.373727] alloc_vfsmnt+0x186/0x990 [ 1101.377510] ? m_stop+0x20/0x20 [ 1101.380782] ? mark_held_locks+0x130/0x130 [ 1101.384998] ? find_held_lock+0x36/0x1c0 [ 1101.389049] ? clone_mnt+0x4c1/0x13b0 [ 1101.392837] ? lock_downgrade+0x900/0x900 [ 1101.396968] ? lock_downgrade+0x900/0x900 [ 1101.401140] ? zap_class+0x640/0x640 [ 1101.404839] ? do_raw_spin_unlock+0xa7/0x330 [ 1101.409238] ? do_raw_spin_trylock+0x270/0x270 [ 1101.413811] clone_mnt+0x124/0x13b0 [ 1101.417437] ? zap_class+0x640/0x640 [ 1101.421141] ? kern_mount_data+0xc0/0xc0 [ 1101.425185] ? lockref_get+0x42/0x50 [ 1101.428885] ? find_held_lock+0x36/0x1c0 [ 1101.432949] ? copy_tree+0x65c/0xac0 [ 1101.436674] ? lock_downgrade+0x900/0x900 [ 1101.440808] ? lock_downgrade+0x900/0x900 [ 1101.444976] ? kasan_check_read+0x11/0x20 [ 1101.449113] ? do_raw_spin_unlock+0xa7/0x330 [ 1101.453508] ? do_raw_spin_trylock+0x270/0x270 [ 1101.458074] ? __is_local_mountpoint+0x200/0x200 [ 1101.462815] ? lock_release+0xa00/0xa00 [ 1101.466779] ? perf_trace_sched_process_exec+0x860/0x860 [ 1101.472218] copy_tree+0x485/0xac0 [ 1101.475749] ? to_mnt_ns+0x20/0x20 [ 1101.479287] ? down_read+0x120/0x120 [ 1101.482995] copy_mnt_ns+0x1dd/0xc00 [ 1101.486717] ? do_mount+0x31f0/0x31f0 [ 1101.490504] ? kmem_cache_alloc+0x33a/0x730 [ 1101.494816] create_new_namespaces+0x17b/0x900 [ 1101.499386] ? sys_ni_syscall+0x20/0x20 [ 1101.503347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.508870] ? ns_capable_common+0x13f/0x170 [ 1101.513263] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1101.518178] ksys_unshare+0x79c/0x10b0 [ 1101.522063] ? wait_for_completion+0x8a0/0x8a0 [ 1101.526663] ? walk_process_tree+0x440/0x440 [ 1101.531066] ? __lock_is_held+0xb5/0x140 [ 1101.535121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.540664] ? check_preemption_disabled+0x48/0x280 [ 1101.545674] ? __sb_end_write+0xd9/0x110 [ 1101.549725] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1101.555248] ? fput+0x130/0x1a0 [ 1101.558513] ? do_syscall_64+0x9a/0x820 [ 1101.562472] ? do_syscall_64+0x9a/0x820 [ 1101.566428] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1101.570998] ? trace_hardirqs_on+0xbd/0x310 [ 1101.575305] ? __ia32_sys_read+0xb0/0xb0 [ 1101.579351] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1101.584701] ? trace_hardirqs_off_caller+0x310/0x310 [ 1101.589793] __x64_sys_unshare+0x31/0x40 [ 1101.593841] do_syscall_64+0x1b9/0x820 [ 1101.597711] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1101.603061] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1101.607978] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1101.612805] ? trace_hardirqs_on_caller+0x310/0x310 [ 1101.617807] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1101.622817] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1101.627821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1101.632652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1101.637824] RIP: 0033:0x457569 [ 1101.641005] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1101.659892] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1101.667587] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1101.674846] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1101.682118] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1101.689386] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1101.696644] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:36:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:59 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x5, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0x4) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="48e54a56b6f36f1c3a1e7500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x72, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000100)={0x0, ""/235}, 0xf3, 0x0, 0x1800) msgget$private(0x0, 0x2) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x2000) openat$cgroup_type(r1, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) fanotify_init(0x19, 0x40000) 06:36:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) rt_sigreturn() getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:36:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="6365706802", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:36:59 executing program 4 (fault-call:6 fault-nth:19): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:36:59 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000180)={0xc}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000100)={0x3f, "f657b4466e9de25651c3d29bca68a11d3f944242195616d74aec93372727fc3d", 0x3, 0x1010, 0x9, 0x0, 0x8, 0x3, 0x2c, 0x6}) write$evdev(r0, &(0x7f00000001c0)=[{{0x77359400}, 0x4, 0xfffffffffffff462, 0xf4eb}, {{}, 0x2, 0xffffffff, 0x4}, {{0x77359400}, 0x12, 0x0, 0x13ee}, {{}, 0x11, 0x0, 0x7}, {{}, 0x17, 0x37e0, 0x60}], 0x78) 06:36:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x7ffff000) [ 1101.934368] FAULT_INJECTION: forcing a failure. [ 1101.934368] name failslab, interval 1, probability 0, space 0, times 0 [ 1101.982449] CPU: 1 PID: 22811 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1101.989488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.998850] Call Trace: [ 1102.001453] dump_stack+0x244/0x39d [ 1102.005112] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1102.010328] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.015884] ? check_preemption_disabled+0x48/0x280 [ 1102.020925] should_fail.cold.4+0xa/0x17 [ 1102.025009] ? print_usage_bug+0xc0/0xc0 [ 1102.029083] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1102.034218] ? zap_class+0x640/0x640 [ 1102.037946] ? __lock_acquire+0x62f/0x4c20 [ 1102.042195] ? find_held_lock+0x36/0x1c0 [ 1102.046273] ? __lock_is_held+0xb5/0x140 [ 1102.050364] ? perf_trace_sched_process_exec+0x860/0x860 [ 1102.055838] ? print_usage_bug+0xc0/0xc0 [ 1102.059921] __should_failslab+0x124/0x180 [ 1102.064169] should_failslab+0x9/0x14 [ 1102.067979] kmem_cache_alloc+0x2be/0x730 [ 1102.072161] alloc_vfsmnt+0xe9/0x990 [ 1102.075898] ? zap_class+0x640/0x640 [ 1102.079677] ? m_stop+0x20/0x20 [ 1102.082983] ? mark_held_locks+0x130/0x130 [ 1102.087229] ? find_held_lock+0x36/0x1c0 [ 1102.091312] ? clone_mnt+0x4c1/0x13b0 [ 1102.095133] ? lock_downgrade+0x900/0x900 [ 1102.099293] ? lock_downgrade+0x900/0x900 [ 1102.103457] ? zap_class+0x640/0x640 [ 1102.107184] ? do_raw_spin_unlock+0xa7/0x330 [ 1102.111605] ? do_raw_spin_trylock+0x270/0x270 [ 1102.116206] clone_mnt+0x124/0x13b0 [ 1102.119845] ? zap_class+0x640/0x640 [ 1102.123582] ? kern_mount_data+0xc0/0xc0 [ 1102.127659] ? lockref_get+0x42/0x50 [ 1102.131396] ? find_held_lock+0x36/0x1c0 [ 1102.135479] ? copy_tree+0x65c/0xac0 [ 1102.139208] ? lock_downgrade+0x900/0x900 [ 1102.143375] ? lock_downgrade+0x900/0x900 [ 1102.147542] ? kasan_check_read+0x11/0x20 [ 1102.151801] ? do_raw_spin_unlock+0xa7/0x330 [ 1102.156222] ? do_raw_spin_trylock+0x270/0x270 [ 1102.160815] ? __is_local_mountpoint+0x200/0x200 [ 1102.165598] ? lock_release+0xa00/0xa00 [ 1102.169589] ? perf_trace_sched_process_exec+0x860/0x860 [ 1102.175079] copy_tree+0x485/0xac0 [ 1102.178656] ? to_mnt_ns+0x20/0x20 [ 1102.182205] ? down_read+0x120/0x120 [ 1102.185950] copy_mnt_ns+0x1dd/0xc00 [ 1102.189689] ? do_mount+0x31f0/0x31f0 [ 1102.193501] ? kmem_cache_alloc+0x33a/0x730 [ 1102.197846] create_new_namespaces+0x17b/0x900 [ 1102.202476] ? sys_ni_syscall+0x20/0x20 [ 1102.206468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.212036] ? ns_capable_common+0x13f/0x170 [ 1102.216466] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1102.221418] ksys_unshare+0x79c/0x10b0 [ 1102.225318] ? wait_for_completion+0x8a0/0x8a0 [ 1102.229917] ? walk_process_tree+0x440/0x440 [ 1102.234342] ? __lock_is_held+0xb5/0x140 [ 1102.238425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.243984] ? check_preemption_disabled+0x48/0x280 [ 1102.249026] ? __sb_end_write+0xd9/0x110 [ 1102.253137] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1102.258698] ? fput+0x130/0x1a0 [ 1102.261996] ? do_syscall_64+0x9a/0x820 [ 1102.265985] ? do_syscall_64+0x9a/0x820 [ 1102.269979] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1102.274582] ? trace_hardirqs_on+0xbd/0x310 [ 1102.278926] ? __ia32_sys_read+0xb0/0xb0 [ 1102.283004] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.288386] ? trace_hardirqs_off_caller+0x310/0x310 [ 1102.293512] __x64_sys_unshare+0x31/0x40 [ 1102.297588] do_syscall_64+0x1b9/0x820 [ 1102.301499] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1102.306876] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1102.311821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1102.316677] ? trace_hardirqs_on_caller+0x310/0x310 [ 1102.321709] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1102.326742] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1102.331778] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1102.336648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.341846] RIP: 0033:0x457569 [ 1102.345055] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1102.363965] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1102.371679] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 06:37:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000180)) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000280)={0x9, 0x0, [{0x80000007, 0x7f, 0x4, 0x5, 0x3, 0x5, 0x10001}, {0x80000002, 0x3, 0x3, 0x59, 0x5, 0x10001, 0x4}, {0x7, 0x3ff, 0x0, 0x7fff, 0x4, 0x9e5a}, {0x7, 0xe000000, 0x4, 0xffffffff, 0xffffffff, 0x9, 0x7}, {0xf, 0x7, 0x3, 0x3, 0x7ff, 0x401, 0x5}, {0x4000000b, 0x4, 0x3, 0x9, 0x0, 0x4d9, 0x7fff}, {0x0, 0x5, 0x4, 0x1, 0x10001, 0x8, 0x4bf}, {0x4, 0xffffffffffffff00, 0x1, 0x100000000, 0xe50, 0x3ff, 0x400}, {0x40000004, 0x124, 0x3, 0xee03, 0x9cd, 0x5, 0x5328}]}) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1102.378960] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1102.386239] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1102.393518] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1102.400799] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 [ 1102.419033] Unknown ioctl 1079268894 06:37:00 executing program 4 (fault-call:6 fault-nth:20): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1102.612676] FAULT_INJECTION: forcing a failure. [ 1102.612676] name failslab, interval 1, probability 0, space 0, times 0 [ 1102.625629] CPU: 1 PID: 22829 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1102.632664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.642040] Call Trace: [ 1102.644650] dump_stack+0x244/0x39d [ 1102.648305] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1102.653532] should_fail.cold.4+0xa/0x17 [ 1102.657637] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1102.662769] ? zap_class+0x640/0x640 [ 1102.666491] ? zap_class+0x640/0x640 [ 1102.670229] ? find_held_lock+0x36/0x1c0 [ 1102.674283] ? __lock_is_held+0xb5/0x140 [ 1102.678416] ? net_ctl_set_ownership+0x118/0x170 [ 1102.683206] ? perf_trace_sched_process_exec+0x860/0x860 [ 1102.688667] ? kfree+0x1f8/0x230 [ 1102.688687] ? ida_alloc_range+0x953/0xc70 [ 1102.688709] __should_failslab+0x124/0x180 [ 1102.696303] should_failslab+0x9/0x14 [ 1102.696321] __kmalloc_track_caller+0x2d1/0x760 [ 1102.696347] ? kstrdup_const+0x66/0x80 [ 1102.696368] kstrdup+0x39/0x70 [ 1102.696387] kstrdup_const+0x66/0x80 [ 1102.696410] alloc_vfsmnt+0x186/0x990 [ 1102.704433] ? m_stop+0x20/0x20 [ 1102.712997] ? mark_held_locks+0x130/0x130 [ 1102.713015] ? find_held_lock+0x36/0x1c0 [ 1102.713042] ? clone_mnt+0x4c1/0x13b0 [ 1102.713061] ? lock_downgrade+0x900/0x900 [ 1102.713080] ? lock_downgrade+0x900/0x900 [ 1102.719988] ? zap_class+0x640/0x640 [ 1102.720005] ? do_raw_spin_unlock+0xa7/0x330 [ 1102.720021] ? do_raw_spin_trylock+0x270/0x270 [ 1102.720053] clone_mnt+0x124/0x13b0 [ 1102.720069] ? zap_class+0x640/0x640 [ 1102.720090] ? kern_mount_data+0xc0/0xc0 [ 1102.731396] ? lockref_get+0x42/0x50 [ 1102.731421] ? find_held_lock+0x36/0x1c0 [ 1102.731448] ? copy_tree+0x65c/0xac0 [ 1102.731467] ? lock_downgrade+0x900/0x900 [ 1102.731484] ? lock_downgrade+0x900/0x900 [ 1102.731504] ? kasan_check_read+0x11/0x20 [ 1102.795525] ? do_raw_spin_unlock+0xa7/0x330 [ 1102.799949] ? do_raw_spin_trylock+0x270/0x270 [ 1102.804547] ? __is_local_mountpoint+0x200/0x200 [ 1102.809339] ? lock_release+0xa00/0xa00 06:37:00 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x442, 0x0) write$P9_ROPEN(r0, &(0x7f00000001c0)={0x18, 0x71, 0x2, {{0x18, 0x1}, 0x98e9}}, 0x18) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x92000, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r2, 0x4}, 0x0) [ 1102.813327] ? perf_trace_sched_process_exec+0x860/0x860 [ 1102.818813] copy_tree+0x485/0xac0 [ 1102.822381] ? to_mnt_ns+0x20/0x20 [ 1102.825947] ? down_read+0x120/0x120 [ 1102.829712] copy_mnt_ns+0x1dd/0xc00 [ 1102.833448] ? do_mount+0x31f0/0x31f0 [ 1102.837259] ? kmem_cache_alloc+0x33a/0x730 [ 1102.841605] create_new_namespaces+0x17b/0x900 [ 1102.846212] ? sys_ni_syscall+0x20/0x20 [ 1102.850207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.855841] ? ns_capable_common+0x13f/0x170 [ 1102.860256] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1102.865193] ksys_unshare+0x79c/0x10b0 [ 1102.869079] ? wait_for_completion+0x8a0/0x8a0 [ 1102.873685] ? walk_process_tree+0x440/0x440 [ 1102.878117] ? __lock_is_held+0xb5/0x140 [ 1102.882190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.887732] ? check_preemption_disabled+0x48/0x280 [ 1102.892754] ? __sb_end_write+0xd9/0x110 [ 1102.896847] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1102.902398] ? fput+0x130/0x1a0 [ 1102.905678] ? do_syscall_64+0x9a/0x820 [ 1102.909670] ? do_syscall_64+0x9a/0x820 [ 1102.913646] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1102.918231] ? trace_hardirqs_on+0xbd/0x310 [ 1102.922553] ? __ia32_sys_read+0xb0/0xb0 [ 1102.926636] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.931989] ? trace_hardirqs_off_caller+0x310/0x310 [ 1102.937088] __x64_sys_unshare+0x31/0x40 [ 1102.941164] do_syscall_64+0x1b9/0x820 [ 1102.945047] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1102.950411] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1102.955331] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1102.960177] ? trace_hardirqs_on_caller+0x310/0x310 [ 1102.965201] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1102.970215] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1102.975248] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1102.980098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.985293] RIP: 0033:0x457569 [ 1102.988485] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:37:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="6365706802", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x200000, 0x0) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1103.007377] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1103.015093] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1103.022370] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1103.029639] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1103.036904] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1103.044174] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:37:01 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x40, 0x103000) write$binfmt_aout(r0, &(0x7f0000000280)={{0x107, 0x3, 0x19, 0xcf, 0x35, 0x6, 0x396, 0x3}, "8be6ad4f0930", [[], [], [], [], [], [], [], [], [], []]}, 0xa26) openat(r3, &(0x7f00000001c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000000c0)=0x618e28c4, 0x4) 06:37:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:02 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) io_setup(0xffffffff00000001, &(0x7f0000000180)=0x0) io_submit(r4, 0x5, &(0x7f0000000640)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x1, r3, &(0x7f0000000280)="0a56ff92a75779e2b3bc5d76e5ef7e01d79e15297df801df663e02e24da9711b64500764cba55988576f6b0f83786e05093b44c8e0fa1a0ec8e7d29521153e23ab42dee06e5099b3647208d9b87ccf49c74a4ed5c0947c03260c5204499673cd61e2344e1b", 0x65, 0x7, 0x0, 0x0, r3}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x3, r2, &(0x7f0000000300)="ac11d3c79758d8422f4d8cbbfb64f61ae8f5affe50daf7c4110ff87aff42e4020a82a152e915e8e4e0e0de8d5ffc88cd2b5f8bcb994f6e6a29e954acfa1c757b4f9c060e6eb1982bca493d5652b787ba7dc4438a6d1c50f0f6628dfbb920aa642e350a94aa92fb9acab86ff3259c95190f634f3711467f997813865ce4eb45a51a0f6fba05f24d21fb8cb85b1961dfff7286e4e82ebfd39b94a380a0c63f9ad11392e366172fa05060faf08411f56fac7c25fef83c6b1210e1bdcc679481440382e987c4bb8f9a652336db7de4b10cf6a799c26f45ec31ccb729b5c4f206", 0xde, 0x8, 0x0, 0x3, r3}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x2, 0x800, r0, &(0x7f0000000440)="4a7dfb274be62fc5080700500a8f3797ef2f7f70e9fbe4a824ade17c0e824f2265175d568461b3f1cce70e22973f8e89bc53f3d1643f622e23cc7e0cc01f2eadd6b60a", 0x43, 0x7ff, 0x0, 0x3, r3}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x88b198fa0dba1aa3, 0x112, r1, &(0x7f0000000500)="e274", 0x2, 0x4, 0x0, 0x3, r3}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0xc8e5a7b4907a97ab, 0x0, r1, &(0x7f0000000580)="4c63d73cce1787d9545ddef7c71c76d1cb2bc2398d6fcfdc0fddcceb6eec0c23276a1a4969d5458151514e7e912d644d6e695fd2c97d29fc0f1e0ff989ccfb04b5689695e1f78f54749c0a520d83e34abc62f63a401ae9279fee2a2d0ea543f3ddb34449cfe90b2f5961a2e8499eec", 0x6f, 0x100, 0x0, 0x1, r3}]) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:02 executing program 4 (fault-call:6 fault-nth:21): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:02 executing program 5 (fault-call:6 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1104.972790] FAULT_INJECTION: forcing a failure. [ 1104.972790] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.003852] CPU: 0 PID: 22867 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1105.010886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.020245] Call Trace: [ 1105.020274] dump_stack+0x244/0x39d [ 1105.020301] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1105.020337] should_fail.cold.4+0xa/0x17 [ 1105.026538] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1105.026572] ? zap_class+0x640/0x640 [ 1105.026588] ? zap_class+0x640/0x640 [ 1105.026613] ? find_held_lock+0x36/0x1c0 [ 1105.026639] ? __lock_is_held+0xb5/0x140 [ 1105.056533] ? ib_umad_kill_port+0x108/0x3a0 [ 1105.060978] ? perf_trace_sched_process_exec+0x860/0x860 [ 1105.066429] ? kfree+0x1f8/0x230 [ 1105.069800] ? ida_alloc_range+0x953/0xc70 [ 1105.074026] __should_failslab+0x124/0x180 [ 1105.078254] should_failslab+0x9/0x14 [ 1105.082045] __kmalloc_track_caller+0x2d1/0x760 [ 1105.086713] ? kstrdup_const+0x66/0x80 [ 1105.090632] kstrdup+0x39/0x70 [ 1105.093837] kstrdup_const+0x66/0x80 [ 1105.097544] alloc_vfsmnt+0x186/0x990 [ 1105.101336] ? m_stop+0x20/0x20 [ 1105.104613] ? mark_held_locks+0x130/0x130 [ 1105.108840] ? find_held_lock+0x36/0x1c0 [ 1105.112914] ? clone_mnt+0x4c1/0x13b0 [ 1105.116718] ? lock_downgrade+0x900/0x900 [ 1105.120867] ? lock_downgrade+0x900/0x900 [ 1105.125036] ? zap_class+0x640/0x640 [ 1105.128749] ? do_raw_spin_unlock+0xa7/0x330 [ 1105.133169] ? do_raw_spin_trylock+0x270/0x270 [ 1105.137782] clone_mnt+0x124/0x13b0 [ 1105.141400] ? zap_class+0x640/0x640 [ 1105.145103] ? kern_mount_data+0xc0/0xc0 [ 1105.149179] ? lockref_get+0x42/0x50 [ 1105.152937] ? find_held_lock+0x36/0x1c0 [ 1105.156994] ? copy_tree+0x65c/0xac0 [ 1105.160725] ? lock_downgrade+0x900/0x900 [ 1105.164862] ? lock_downgrade+0x900/0x900 [ 1105.169001] ? kasan_check_read+0x11/0x20 [ 1105.173162] ? do_raw_spin_unlock+0xa7/0x330 [ 1105.177585] ? do_raw_spin_trylock+0x270/0x270 [ 1105.182178] ? __is_local_mountpoint+0x200/0x200 [ 1105.186951] ? lock_release+0xa00/0xa00 [ 1105.190943] ? perf_trace_sched_process_exec+0x860/0x860 [ 1105.196384] copy_tree+0x485/0xac0 [ 1105.199918] ? to_mnt_ns+0x20/0x20 [ 1105.203447] ? down_read+0x120/0x120 [ 1105.207206] copy_mnt_ns+0x1dd/0xc00 [ 1105.210960] ? do_mount+0x31f0/0x31f0 [ 1105.214789] ? kmem_cache_alloc+0x33a/0x730 [ 1105.219120] create_new_namespaces+0x17b/0x900 [ 1105.223702] ? sys_ni_syscall+0x20/0x20 [ 1105.227683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.233247] ? ns_capable_common+0x13f/0x170 [ 1105.237662] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1105.242618] ksys_unshare+0x79c/0x10b0 [ 1105.246524] ? wait_for_completion+0x8a0/0x8a0 [ 1105.251126] ? walk_process_tree+0x440/0x440 [ 1105.255537] ? __lock_is_held+0xb5/0x140 [ 1105.259603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.265158] ? check_preemption_disabled+0x48/0x280 [ 1105.270326] ? __sb_end_write+0xd9/0x110 [ 1105.274381] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1105.279926] ? fput+0x130/0x1a0 [ 1105.283208] ? do_syscall_64+0x9a/0x820 [ 1105.287186] ? do_syscall_64+0x9a/0x820 [ 1105.291160] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1105.295743] ? trace_hardirqs_on+0xbd/0x310 [ 1105.300058] ? __ia32_sys_read+0xb0/0xb0 [ 1105.304132] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.309485] ? trace_hardirqs_off_caller+0x310/0x310 [ 1105.314580] __x64_sys_unshare+0x31/0x40 [ 1105.318641] do_syscall_64+0x1b9/0x820 [ 1105.322528] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1105.327894] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1105.332821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1105.337666] ? trace_hardirqs_on_caller+0x310/0x310 [ 1105.342682] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1105.347701] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1105.352737] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1105.357589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.362791] RIP: 0033:0x457569 [ 1105.365989] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1105.384913] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1105.392625] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1105.399881] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1105.407151] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1105.414410] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1105.421679] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 [ 1105.478133] FAULT_INJECTION: forcing a failure. [ 1105.478133] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.496697] CPU: 0 PID: 22878 Comm: syz-executor5 Not tainted 4.19.0+ #313 [ 1105.503745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.513094] Call Trace: [ 1105.515737] dump_stack+0x244/0x39d [ 1105.519397] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1105.524611] ? get_pid_task+0xd6/0x1a0 06:37:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-aesni\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1105.528527] should_fail.cold.4+0xa/0x17 [ 1105.532603] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1105.537728] ? __f_unlock_pos+0x19/0x20 [ 1105.541721] ? lock_downgrade+0x900/0x900 [ 1105.545922] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1105.551476] ? proc_fail_nth_write+0x9e/0x210 [ 1105.555985] ? proc_cwd_link+0x1d0/0x1d0 [ 1105.560072] ? find_held_lock+0x36/0x1c0 [ 1105.564178] ? hash_netportnet6_del+0x158/0x1390 [ 1105.568953] ? perf_trace_sched_process_exec+0x860/0x860 [ 1105.574393] ? __lock_is_held+0xb5/0x140 [ 1105.578463] __should_failslab+0x124/0x180 [ 1105.582707] should_failslab+0x9/0x14 [ 1105.586514] __kmalloc_track_caller+0x2d1/0x760 [ 1105.591197] ? strncpy_from_user+0x5a0/0x5a0 [ 1105.595621] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1105.601190] ? strndup_user+0x77/0xd0 [ 1105.604999] memdup_user+0x2c/0xa0 [ 1105.608547] strndup_user+0x77/0xd0 [ 1105.612181] ksys_mount+0x3c/0x140 [ 1105.615728] __x64_sys_mount+0xbe/0x150 [ 1105.619715] do_syscall_64+0x1b9/0x820 [ 1105.623619] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1105.628987] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1105.633924] ? trace_hardirqs_on_caller+0x310/0x310 [ 1105.638967] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1105.643991] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1105.650664] ? __switch_to_asm+0x40/0x70 [ 1105.654728] ? __switch_to_asm+0x34/0x70 [ 1105.658829] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1105.663685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.668919] RIP: 0033:0x457569 [ 1105.672135] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1105.691040] RSP: 002b:00007fc425597c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1105.698752] RAX: ffffffffffffffda RBX: 00007fc425597c90 RCX: 0000000000457569 [ 1105.706023] RDX: 00000000200001c0 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1105.713292] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1105.720562] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc4255986d4 [ 1105.727831] R13: 00000000004c2b0c R14: 00000000004d4180 R15: 0000000000000006 06:37:03 executing program 5 (fault-call:6 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:03 executing program 4 (fault-call:6 fault-nth:22): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) [ 1105.840506] FAULT_INJECTION: forcing a failure. [ 1105.840506] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.852303] CPU: 1 PID: 22896 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1105.859330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.868687] Call Trace: [ 1105.871273] dump_stack+0x244/0x39d [ 1105.874917] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1105.880127] should_fail.cold.4+0xa/0x17 [ 1105.884186] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1105.889294] ? zap_class+0x640/0x640 [ 1105.893000] ? zap_class+0x640/0x640 [ 1105.896717] ? find_held_lock+0x36/0x1c0 [ 1105.900786] ? __lock_is_held+0xb5/0x140 [ 1105.904851] ? perf_trace_sched_process_exec+0x860/0x860 [ 1105.910298] ? kfree+0x1f8/0x230 [ 1105.913689] ? ida_alloc_range+0x953/0xc70 [ 1105.917943] __should_failslab+0x124/0x180 [ 1105.922195] should_failslab+0x9/0x14 [ 1105.926115] __kmalloc_track_caller+0x2d1/0x760 [ 1105.930795] ? kstrdup_const+0x66/0x80 [ 1105.934673] kstrdup+0x39/0x70 [ 1105.937871] kstrdup_const+0x66/0x80 [ 1105.941589] alloc_vfsmnt+0x186/0x990 [ 1105.945378] ? m_stop+0x20/0x20 [ 1105.948680] ? mark_held_locks+0x130/0x130 [ 1105.952921] ? find_held_lock+0x36/0x1c0 [ 1105.956989] ? clone_mnt+0x4c1/0x13b0 [ 1105.960798] ? lock_downgrade+0x900/0x900 [ 1105.964944] ? lock_downgrade+0x900/0x900 [ 1105.969083] ? zap_class+0x640/0x640 [ 1105.972794] ? do_raw_spin_unlock+0xa7/0x330 [ 1105.977193] ? do_raw_spin_trylock+0x270/0x270 [ 1105.981770] clone_mnt+0x124/0x13b0 [ 1105.985387] ? zap_class+0x640/0x640 [ 1105.989097] ? kern_mount_data+0xc0/0xc0 [ 1105.993212] ? lockref_get+0x42/0x50 [ 1105.996918] ? find_held_lock+0x36/0x1c0 [ 1106.000974] ? copy_tree+0x65c/0xac0 [ 1106.004695] ? lock_downgrade+0x900/0x900 [ 1106.008842] ? lock_downgrade+0x900/0x900 [ 1106.012992] ? kasan_check_read+0x11/0x20 [ 1106.017145] ? do_raw_spin_unlock+0xa7/0x330 [ 1106.021555] ? do_raw_spin_trylock+0x270/0x270 [ 1106.026147] ? __is_local_mountpoint+0x200/0x200 [ 1106.030914] ? lock_release+0xa00/0xa00 [ 1106.034876] ? perf_trace_sched_process_exec+0x860/0x860 [ 1106.040320] copy_tree+0x485/0xac0 [ 1106.043854] ? to_mnt_ns+0x20/0x20 [ 1106.047381] ? down_read+0x120/0x120 [ 1106.051115] copy_mnt_ns+0x1dd/0xc00 [ 1106.054853] ? do_mount+0x31f0/0x31f0 [ 1106.058648] ? kmem_cache_alloc+0x33a/0x730 [ 1106.062965] create_new_namespaces+0x17b/0x900 [ 1106.067539] ? sys_ni_syscall+0x20/0x20 [ 1106.071507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.077036] ? ns_capable_common+0x13f/0x170 [ 1106.081447] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1106.086386] ksys_unshare+0x79c/0x10b0 [ 1106.090265] ? wait_for_completion+0x8a0/0x8a0 [ 1106.094849] ? walk_process_tree+0x440/0x440 [ 1106.099252] ? __lock_is_held+0xb5/0x140 [ 1106.103326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.108857] ? check_preemption_disabled+0x48/0x280 [ 1106.113868] ? __sb_end_write+0xd9/0x110 [ 1106.117923] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1106.123451] ? fput+0x130/0x1a0 [ 1106.126735] ? do_syscall_64+0x9a/0x820 [ 1106.130715] ? do_syscall_64+0x9a/0x820 [ 1106.134693] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1106.139289] ? trace_hardirqs_on+0xbd/0x310 [ 1106.143628] ? __ia32_sys_read+0xb0/0xb0 [ 1106.147679] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1106.153044] ? trace_hardirqs_off_caller+0x310/0x310 [ 1106.158164] __x64_sys_unshare+0x31/0x40 [ 1106.162245] do_syscall_64+0x1b9/0x820 [ 1106.166149] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1106.171516] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1106.176432] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1106.181268] ? trace_hardirqs_on_caller+0x310/0x310 [ 1106.186284] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1106.191298] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1106.196310] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1106.201158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1106.206351] RIP: 0033:0x457569 [ 1106.209534] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1106.228423] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1106.236138] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1106.243401] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1106.250669] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1106.257931] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1106.265219] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 [ 1106.275818] FAULT_INJECTION: forcing a failure. [ 1106.275818] name failslab, interval 1, probability 0, space 0, times 0 [ 1106.288410] CPU: 0 PID: 22898 Comm: syz-executor5 Not tainted 4.19.0+ #313 [ 1106.295443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1106.295451] Call Trace: [ 1106.295475] dump_stack+0x244/0x39d [ 1106.295500] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1106.307431] ? __kernel_text_address+0xd/0x40 [ 1106.307450] ? unwind_get_return_address+0x61/0xa0 [ 1106.307474] should_fail.cold.4+0xa/0x17 [ 1106.307496] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1106.307528] ? save_stack+0x43/0xd0 [ 1106.316327] ? kasan_kmalloc+0xc7/0xe0 [ 1106.316343] ? __kmalloc_track_caller+0x157/0x760 [ 1106.316360] ? memdup_user+0x2c/0xa0 [ 1106.316379] ? do_syscall_64+0x1b9/0x820 [ 1106.316397] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1106.316418] ? proc_fail_nth_write+0x9e/0x210 [ 1106.325834] ? proc_cwd_link+0x1d0/0x1d0 [ 1106.325857] ? find_held_lock+0x36/0x1c0 [ 1106.325881] ? hci_dev_cmd+0x378/0xbc0 [ 1106.325926] ? perf_trace_sched_process_exec+0x860/0x860 [ 1106.335068] ? lock_release+0xa00/0xa00 [ 1106.335083] ? perf_trace_sched_process_exec+0x860/0x860 [ 1106.335123] __should_failslab+0x124/0x180 [ 1106.335148] should_failslab+0x9/0x14 [ 1106.399925] __kmalloc_track_caller+0x2d1/0x760 [ 1106.404605] ? strncpy_from_user+0x5a0/0x5a0 [ 1106.409030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1106.414573] ? strndup_user+0x77/0xd0 [ 1106.418387] memdup_user+0x2c/0xa0 [ 1106.421934] strndup_user+0x77/0xd0 [ 1106.425569] ksys_mount+0x73/0x140 [ 1106.429142] __x64_sys_mount+0xbe/0x150 [ 1106.433139] do_syscall_64+0x1b9/0x820 [ 1106.437035] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1106.442408] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1106.447390] ? trace_hardirqs_on_caller+0x310/0x310 [ 1106.452420] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1106.457446] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1106.464128] ? __switch_to_asm+0x40/0x70 [ 1106.468201] ? __switch_to_asm+0x34/0x70 [ 1106.472275] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1106.477142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1106.482336] RIP: 0033:0x457569 [ 1106.485533] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1106.504442] RSP: 002b:00007fc425597c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1106.512153] RAX: ffffffffffffffda RBX: 00007fc425597c90 RCX: 0000000000457569 [ 1106.519435] RDX: 00000000200001c0 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1106.526704] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1106.533973] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc4255986d4 [ 1106.541253] R13: 00000000004c2b0c R14: 00000000004d4180 R15: 0000000000000006 06:37:12 executing program 2: msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000000000000e700000000000000000000000000000000000000000000000000000000004a9a8bcb00000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) waitid(0x0, r0, &(0x7f0000000040), 0x0, &(0x7f0000000100)) 06:37:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) personality(0x400000) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000280)=""/180, 0xb4}, {&(0x7f0000000340)=""/156, 0x9c}, {&(0x7f0000000400)=""/74, 0x4a}], 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xf, &(0x7f0000000180), &(0x7f0000000140)=0x331) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:12 executing program 5 (fault-call:6 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:12 executing program 4 (fault-call:6 fault-nth:23): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) [ 1114.890521] FAULT_INJECTION: forcing a failure. [ 1114.890521] name failslab, interval 1, probability 0, space 0, times 0 [ 1114.911569] CPU: 0 PID: 22905 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1114.918637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.928006] Call Trace: [ 1114.930619] dump_stack+0x244/0x39d [ 1114.934263] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1114.939483] should_fail.cold.4+0xa/0x17 [ 1114.943562] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1114.948709] ? zap_class+0x640/0x640 [ 1114.952415] ? zap_class+0x640/0x640 [ 1114.956173] ? find_held_lock+0x36/0x1c0 [ 1114.960263] ? __lock_is_held+0xb5/0x140 [ 1114.964321] ? perf_trace_sched_process_exec+0x860/0x860 [ 1114.969772] ? kfree+0x1f8/0x230 [ 1114.973166] ? ida_alloc_range+0x953/0xc70 [ 1114.977409] __should_failslab+0x124/0x180 [ 1114.981639] should_failslab+0x9/0x14 [ 1114.985428] __kmalloc_track_caller+0x2d1/0x760 [ 1114.990108] ? kstrdup_const+0x66/0x80 [ 1114.994017] kstrdup+0x39/0x70 [ 1114.997222] kstrdup_const+0x66/0x80 [ 1115.000933] alloc_vfsmnt+0x186/0x990 [ 1115.004738] ? m_stop+0x20/0x20 [ 1115.008015] ? mark_held_locks+0x130/0x130 [ 1115.012241] ? find_held_lock+0x36/0x1c0 [ 1115.016296] ? clone_mnt+0x4c1/0x13b0 [ 1115.020095] ? lock_downgrade+0x900/0x900 [ 1115.024264] ? lock_downgrade+0x900/0x900 [ 1115.028404] ? zap_class+0x640/0x640 [ 1115.032105] ? do_raw_spin_unlock+0xa7/0x330 [ 1115.036527] ? do_raw_spin_trylock+0x270/0x270 [ 1115.041134] clone_mnt+0x124/0x13b0 [ 1115.044754] ? zap_class+0x640/0x640 [ 1115.048476] ? kern_mount_data+0xc0/0xc0 [ 1115.052539] ? lockref_get+0x42/0x50 [ 1115.056258] ? find_held_lock+0x36/0x1c0 [ 1115.060327] ? copy_tree+0x65c/0xac0 [ 1115.064034] ? lock_downgrade+0x900/0x900 [ 1115.068188] ? lock_downgrade+0x900/0x900 [ 1115.072342] ? kasan_check_read+0x11/0x20 [ 1115.076499] ? do_raw_spin_unlock+0xa7/0x330 [ 1115.080916] ? do_raw_spin_trylock+0x270/0x270 [ 1115.085502] ? __is_local_mountpoint+0x200/0x200 [ 1115.090248] ? lock_release+0xa00/0xa00 [ 1115.094212] ? perf_trace_sched_process_exec+0x860/0x860 [ 1115.099655] copy_tree+0x485/0xac0 [ 1115.103190] ? to_mnt_ns+0x20/0x20 [ 1115.106718] ? down_read+0x120/0x120 [ 1115.110432] copy_mnt_ns+0x1dd/0xc00 [ 1115.114163] ? do_mount+0x31f0/0x31f0 [ 1115.117972] ? kmem_cache_alloc+0x33a/0x730 [ 1115.122296] create_new_namespaces+0x17b/0x900 [ 1115.126871] ? sys_ni_syscall+0x20/0x20 [ 1115.130836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1115.136370] ? ns_capable_common+0x13f/0x170 [ 1115.140772] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1115.145694] ksys_unshare+0x79c/0x10b0 [ 1115.149578] ? wait_for_completion+0x8a0/0x8a0 [ 1115.154191] ? walk_process_tree+0x440/0x440 [ 1115.158608] ? __lock_is_held+0xb5/0x140 [ 1115.162691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1115.168243] ? check_preemption_disabled+0x48/0x280 [ 1115.173253] ? __sb_end_write+0xd9/0x110 [ 1115.177318] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1115.182842] ? fput+0x130/0x1a0 [ 1115.186111] ? do_syscall_64+0x9a/0x820 [ 1115.190091] ? do_syscall_64+0x9a/0x820 [ 1115.194064] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1115.198650] ? trace_hardirqs_on+0xbd/0x310 [ 1115.202961] ? __ia32_sys_read+0xb0/0xb0 [ 1115.207023] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1115.212398] ? trace_hardirqs_off_caller+0x310/0x310 [ 1115.217509] __x64_sys_unshare+0x31/0x40 [ 1115.221559] do_syscall_64+0x1b9/0x820 [ 1115.225434] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1115.230792] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1115.235708] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1115.240539] ? trace_hardirqs_on_caller+0x310/0x310 [ 1115.245542] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1115.250563] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1115.255609] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1115.260461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1115.265637] RIP: 0033:0x457569 [ 1115.268819] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:37:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffd, 0x1) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1115.287911] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1115.295636] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1115.302908] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1115.310164] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1115.317601] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1115.324857] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 [ 1115.337555] FAULT_INJECTION: forcing a failure. [ 1115.337555] name failslab, interval 1, probability 0, space 0, times 0 [ 1115.350791] CPU: 1 PID: 22922 Comm: syz-executor5 Not tainted 4.19.0+ #313 [ 1115.357824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.367187] Call Trace: [ 1115.369799] dump_stack+0x244/0x39d [ 1115.373453] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1115.378678] should_fail.cold.4+0xa/0x17 [ 1115.382769] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1115.387890] ? __lock_acquire+0x62f/0x4c20 [ 1115.392148] ? lock_downgrade+0x900/0x900 [ 1115.396310] ? check_preemption_disabled+0x48/0x280 [ 1115.401342] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1115.406286] ? kasan_check_read+0x11/0x20 [ 1115.410461] ? mark_held_locks+0x130/0x130 [ 1115.414743] ? find_held_lock+0x36/0x1c0 [ 1115.418843] ? perf_trace_sched_process_exec+0x860/0x860 [ 1115.424320] __should_failslab+0x124/0x180 [ 1115.428578] should_failslab+0x9/0x14 [ 1115.432392] kmem_cache_alloc+0x2be/0x730 [ 1115.436572] ? proc_cwd_link+0x1d0/0x1d0 [ 1115.440664] getname_flags+0xd0/0x590 [ 1115.444484] user_path_at_empty+0x2d/0x50 [ 1115.448654] do_mount+0x177/0x31f0 [ 1115.452214] ? lock_downgrade+0x900/0x900 [ 1115.456387] ? copy_mount_string+0x40/0x40 [ 1115.460651] ? usercopy_warn+0x110/0x110 [ 1115.464755] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1115.470305] ? _copy_from_user+0xdf/0x150 [ 1115.474474] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1115.480031] ? copy_mount_options+0x315/0x430 [ 1115.484539] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1115.490093] ksys_mount+0x12d/0x140 [ 1115.493752] __x64_sys_mount+0xbe/0x150 [ 1115.497746] do_syscall_64+0x1b9/0x820 [ 1115.501653] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1115.507035] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1115.511984] ? trace_hardirqs_on_caller+0x310/0x310 [ 1115.517023] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1115.522062] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1115.528743] ? __switch_to_asm+0x40/0x70 [ 1115.532817] ? __switch_to_asm+0x34/0x70 [ 1115.536896] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1115.541772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1115.546971] RIP: 0033:0x457569 [ 1115.550201] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1115.569110] RSP: 002b:00007fc425597c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1115.576840] RAX: ffffffffffffffda RBX: 00007fc425597c90 RCX: 0000000000457569 [ 1115.584126] RDX: 00000000200001c0 RSI: 00000000200000c0 RDI: 0000000020000040 06:37:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='^!\x00', 0x0) r3 = request_key(&(0x7f0000000840)='encrypted\x00', &(0x7f0000000880)={'syz', 0x1}, &(0x7f00000008c0)='syzkaller0\x00', 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, r2, &(0x7f00000007c0)=[{&(0x7f0000000300)="8ebd384bffd0dd1421d7b03d523545f13666c3970cc5d64fdeeb2edc727e16f60b4c9da6b72a", 0x26}, {&(0x7f0000000340)="f6313c37e91bf0f812e8c517db7a12722826d4e4f05391c1aa83a3142245d11134e967d00d37989a9b02c9d12eea859f3310c397aa1be9e4d94a2011aace16e32256bbbacffed8c26c03e2470cfcd05aaa2dcb6c2a3d85540922ce4b7ae32a7c6f85e460a657e4fa9fb97ec1b11ca0fa6bc2633cc2a9bb50f2ff2c58dc05a4820b471ed8c13f395467f0de24f7afee0c68764af24be99a8f1f0097daf80c48df3ab0fef4696afecf38edc0d1a902c4f7df", 0xb1}, {&(0x7f0000000400)="6a13bd8c40e7", 0x6}, {&(0x7f0000000440)="6cab67aa4107666dfa78ca245af7fe5883fe1b1d5452290a5b2994448f0c064c4115cbb3bc4a51574056c97607d638ea6076c9060948c9be9be6cff854f795da584dd7f049241ecd2c2d8ea975b236e666e37f81940146d44873a2f67846126f251582ad0119a66b7914d592da283879c3b78f1ca2117c5091329fa1df3f64dcc258b8545aa8aac8", 0x88}, {&(0x7f0000000500)="3b86e551846c95c8af7044f203a364df0b745b0d381a0e99d80bbc6b0d1e00fad486048494cec42012db54b9ca1c2769b7b0c73a997a99a51a245267de14b7b86009c6e0cfc7a1a35f5684e7f8c75de06fb50ab22183f8dd122b71d61218efd9e90628a4908062e80418c467368587088da9a38bcc108091a5e963f6af009af02197542e6632", 0x86}, {&(0x7f00000005c0)="fb29f243e36aa08cd280dcc0a2b2e7f540c42de5cd8fba3f1264f2e311325bf463a463fdd7fab25ce3626b94826d347de3764c683ce3447922d8aed8ab6dade7c863a9fb8dff7a01c3837ad10a49f6b7c177bd813e5ff409b8d0aa74f68f02e3f328009c9207d10ededaf9168de5", 0x6e}, {&(0x7f0000000640)="f546c141c7986239eb053a2ba043e631cc26c0bebaad23e13e10bb8d1e8bf9eca82d0df39b76c7d08c36874a8d37bfacefadbf9fdfaa7e789a26ca65dff90a79ac62f062b6c26b8181f5251e19ccb5debbfd82c7f89003801b", 0x59}, {&(0x7f00000006c0)="abc4f91b1153e6d189cae352fc17aff2dea20bde989b13986cf9fcb852a287bafdd16ee9786abe1a7f27c20c6b55a76c0bec53092625a06a508def4eef31340ab5476b8dd3ea317d38d1916bf7788caeae1a5d40321016805daebad7ec5dfe2cf16c0bf2580dcefca7329f1db40c6d58794cbcafe9e05f26c8232cf047601a831218efef2ed0a4735723d5f8c2dbfdcf26664b0aea8219aad3a38315be1cec89c143be2e458040f35c7ed8e516c5598c57eb978823b4e2a811bfed5acfc55d8703918d0a509953ed4c6323d61724769e0d9f20fa337d76819591ee0ee3fb5b9dcd3a38d9535b", 0xe6}], 0x8, r3) r4 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$KVM_SIGNAL_MSI(r4, 0x4020aea5, &(0x7f0000000180)={0x0, 0x2000, 0xa16f, 0xae83, 0x10000}) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x298, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00), 0x0, 0x8000}}], 0x2, 0x3) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000900)={0x80000001, 0x6}, 0x4) [ 1115.591402] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1115.598679] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc4255986d4 [ 1115.605962] R13: 00000000004c2b0c R14: 00000000004d4180 R15: 0000000000000006 06:37:13 executing program 5 (fault-call:6 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet_tcp_int(r2, 0x6, 0xf, &(0x7f0000000000), &(0x7f0000000180)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000280)) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xe66) 06:37:13 executing program 4 (fault-call:6 fault-nth:24): unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:13 executing program 2: r0 = msgget$private(0x0, 0x19) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x6, 0x1) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000080)=0x100000000, 0x2) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000180), &(0x7f00000001c0)=0x4) msgrcv(r0, &(0x7f0000000000)={0x0, ""/106}, 0x26, 0x0, 0x0) [ 1115.802422] FAULT_INJECTION: forcing a failure. [ 1115.802422] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1115.802775] FAULT_INJECTION: forcing a failure. [ 1115.802775] name failslab, interval 1, probability 0, space 0, times 0 [ 1115.814275] CPU: 0 PID: 22947 Comm: syz-executor5 Not tainted 4.19.0+ #313 [ 1115.814288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.814294] Call Trace: [ 1115.814318] dump_stack+0x244/0x39d [ 1115.814344] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1115.814377] should_fail.cold.4+0xa/0x17 [ 1115.857352] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1115.862465] ? rcu_softirq_qs+0x20/0x20 [ 1115.866449] ? dput.part.25+0x241/0x860 [ 1115.870433] ? lock_downgrade+0x900/0x900 [ 1115.874590] ? check_preemption_disabled+0x48/0x280 [ 1115.879625] ? mark_held_locks+0x130/0x130 [ 1115.883877] ? zap_class+0x640/0x640 [ 1115.887603] ? print_usage_bug+0xc0/0xc0 [ 1115.891689] ? find_held_lock+0x36/0x1c0 [ 1115.895765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1115.901308] ? should_fail+0x22d/0xd01 [ 1115.905209] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1115.910316] ? __lock_acquire+0x62f/0x4c20 [ 1115.914561] __alloc_pages_nodemask+0x34b/0xde0 [ 1115.919231] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1115.924163] ? kasan_check_read+0x11/0x20 [ 1115.928321] ? __alloc_pages_slowpath+0x2e10/0x2e10 [ 1115.933345] ? mark_held_locks+0x130/0x130 [ 1115.937588] ? find_held_lock+0x36/0x1c0 [ 1115.941680] ? trace_hardirqs_off+0xb8/0x310 [ 1115.946095] cache_grow_begin+0xa5/0x8c0 [ 1115.950181] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1115.955722] ? check_preemption_disabled+0x48/0x280 [ 1115.960750] kmem_cache_alloc+0x66b/0x730 [ 1115.964901] ? proc_cwd_link+0x1d0/0x1d0 [ 1115.968979] getname_flags+0xd0/0x590 [ 1115.972788] user_path_at_empty+0x2d/0x50 [ 1115.976943] do_mount+0x177/0x31f0 [ 1115.980488] ? lock_downgrade+0x900/0x900 [ 1115.984643] ? copy_mount_string+0x40/0x40 [ 1115.988880] ? usercopy_warn+0x110/0x110 [ 1115.992962] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1115.998498] ? _copy_from_user+0xdf/0x150 [ 1116.002694] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1116.008253] ? copy_mount_options+0x315/0x430 [ 1116.012750] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1116.018308] ksys_mount+0x12d/0x140 [ 1116.021941] __x64_sys_mount+0xbe/0x150 [ 1116.025924] do_syscall_64+0x1b9/0x820 [ 1116.029832] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1116.035199] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1116.040146] ? trace_hardirqs_on_caller+0x310/0x310 [ 1116.045167] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1116.050199] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1116.056873] ? __switch_to_asm+0x40/0x70 [ 1116.060941] ? __switch_to_asm+0x34/0x70 [ 1116.065009] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1116.069893] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1116.075085] RIP: 0033:0x457569 [ 1116.078288] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:37:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068a0", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1116.097190] RSP: 002b:00007fc425597c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1116.104903] RAX: ffffffffffffffda RBX: 00007fc425597c90 RCX: 0000000000457569 [ 1116.112171] RDX: 00000000200001c0 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1116.119439] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1116.126705] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc4255986d4 [ 1116.133978] R13: 00000000004c2b0c R14: 00000000004d4180 R15: 0000000000000006 [ 1116.144063] CPU: 1 PID: 22945 Comm: syz-executor4 Not tainted 4.19.0+ #313 [ 1116.151136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1116.160502] Call Trace: [ 1116.163106] dump_stack+0x244/0x39d [ 1116.166763] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1116.172002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1116.177552] ? check_preemption_disabled+0x48/0x280 [ 1116.182592] should_fail.cold.4+0xa/0x17 [ 1116.186672] ? print_usage_bug+0xc0/0xc0 [ 1116.190752] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1116.195881] ? zap_class+0x640/0x640 [ 1116.199615] ? __lock_acquire+0x62f/0x4c20 [ 1116.203873] ? find_held_lock+0x36/0x1c0 [ 1116.207960] ? __lock_is_held+0xb5/0x140 [ 1116.212054] ? perf_trace_sched_process_exec+0x860/0x860 [ 1116.217519] ? print_usage_bug+0xc0/0xc0 [ 1116.221604] __should_failslab+0x124/0x180 [ 1116.225865] should_failslab+0x9/0x14 [ 1116.229680] kmem_cache_alloc+0x2be/0x730 [ 1116.233854] alloc_vfsmnt+0xe9/0x990 [ 1116.237586] ? zap_class+0x640/0x640 [ 1116.241319] ? m_stop+0x20/0x20 [ 1116.244627] ? mark_held_locks+0x130/0x130 [ 1116.248880] ? find_held_lock+0x36/0x1c0 [ 1116.252979] ? clone_mnt+0x4c1/0x13b0 [ 1116.256826] ? lock_downgrade+0x900/0x900 [ 1116.260989] ? lock_downgrade+0x900/0x900 [ 1116.265167] ? zap_class+0x640/0x640 [ 1116.268898] ? do_raw_spin_unlock+0xa7/0x330 [ 1116.273791] ? do_raw_spin_trylock+0x270/0x270 [ 1116.278400] clone_mnt+0x124/0x13b0 [ 1116.282038] ? zap_class+0x640/0x640 [ 1116.285774] ? kern_mount_data+0xc0/0xc0 [ 1116.289846] ? lockref_get+0x42/0x50 [ 1116.293590] ? find_held_lock+0x36/0x1c0 [ 1116.297677] ? copy_tree+0x65c/0xac0 [ 1116.301421] ? lock_downgrade+0x900/0x900 [ 1116.305587] ? lock_downgrade+0x900/0x900 [ 1116.309752] ? kasan_check_read+0x11/0x20 [ 1116.313915] ? do_raw_spin_unlock+0xa7/0x330 [ 1116.318334] ? do_raw_spin_trylock+0x270/0x270 [ 1116.322933] ? __is_local_mountpoint+0x200/0x200 [ 1116.327703] ? lock_release+0xa00/0xa00 [ 1116.331677] ? perf_trace_sched_process_exec+0x860/0x860 [ 1116.337158] copy_tree+0x485/0xac0 [ 1116.340722] ? to_mnt_ns+0x20/0x20 [ 1116.344279] ? down_read+0x120/0x120 [ 1116.348033] copy_mnt_ns+0x1dd/0xc00 06:37:14 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x4, 0x109100) epoll_wait(r3, &(0x7f0000000280)=[{}, {}, {}], 0x3, 0x49f46850) r4 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000002c0)=0x1) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000180)={0x80}, 0x4) sendto$llc(r0, &(0x7f0000000300)="aa47c7c1d5ce0ed48bf0c5ed8be1c608a770cb34eb59f0b44b2652684e27a650e92fbf95c56197b8b4bcd6759f4abfb857f1eb9fb12e60d9f0ee2ea483505fa0c6a2cf1035559161b73ebabb64918db0", 0x50, 0x40004, &(0x7f0000000380)={0x1a, 0x110, 0x1, 0x6b, 0x1, 0x6}, 0x10) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1116.351785] ? do_mount+0x31f0/0x31f0 [ 1116.355611] ? kmem_cache_alloc+0x33a/0x730 [ 1116.359961] create_new_namespaces+0x17b/0x900 [ 1116.364621] ? sys_ni_syscall+0x20/0x20 [ 1116.368614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1116.374198] ? ns_capable_common+0x13f/0x170 [ 1116.378639] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1116.383633] ksys_unshare+0x79c/0x10b0 [ 1116.387524] ? wait_for_completion+0x8a0/0x8a0 [ 1116.392097] ? walk_process_tree+0x440/0x440 [ 1116.396520] ? __lock_is_held+0xb5/0x140 [ 1116.400617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1116.406167] ? check_preemption_disabled+0x48/0x280 [ 1116.411194] ? __sb_end_write+0xd9/0x110 [ 1116.415263] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1116.420814] ? fput+0x130/0x1a0 [ 1116.424113] ? do_syscall_64+0x9a/0x820 [ 1116.428110] ? do_syscall_64+0x9a/0x820 [ 1116.432162] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1116.436761] ? trace_hardirqs_on+0xbd/0x310 [ 1116.441097] ? __ia32_sys_read+0xb0/0xb0 [ 1116.445185] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1116.450566] ? trace_hardirqs_off_caller+0x310/0x310 [ 1116.455704] __x64_sys_unshare+0x31/0x40 [ 1116.459777] do_syscall_64+0x1b9/0x820 [ 1116.463677] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1116.469062] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1116.474003] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1116.478861] ? trace_hardirqs_on_caller+0x310/0x310 [ 1116.483898] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1116.488930] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1116.493996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1116.498913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1116.504109] RIP: 0033:0x457569 [ 1116.507367] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1116.526277] RSP: 002b:00007f3737844c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1116.533999] RAX: ffffffffffffffda RBX: 00007f3737844c90 RCX: 0000000000457569 [ 1116.541320] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008020400 [ 1116.548612] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1116.555914] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f37378456d4 [ 1116.563190] R13: 00000000004c5199 R14: 00000000004d8998 R15: 0000000000000005 06:37:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) socket(0xb, 0x8000f, 0x3) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:14 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:14 executing program 3: r0 = timerfd_create(0x9, 0x80800) fsetxattr$security_smack_transmute(r0, &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x2) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x34) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3b1ed903, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @ipv4={[], [], @broadcast}, 0x7}, {0xa, 0x4e21, 0x3, @loopback, 0x80000001}, r2, 0x4ce1}}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x800000000000002, 0x10) syz_open_dev$rtc(&(0x7f0000000480)='/dev/rtc#\x00', 0x2, 0x40) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r4, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f00000003c0)={0x0, @data}) 06:37:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='%eph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$P9_RSTATFS(r2, &(0x7f0000000180)={0x43, 0x9, 0x2, {0xfffffffffffffe00, 0x7fff, 0x5, 0x80000001, 0xfffffffffffff801, 0x40, 0xfff, 0x10001, 0x6}}, 0x43) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:14 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x80202c0) 06:37:15 executing program 2: msgrcv(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009a8c430176b1"], 0x72, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80240, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000040)=""/93, &(0x7f00000000c0)=0x5d) 06:37:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='c%ph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x480080, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e22, 0x5, @empty, 0x5}}, 0x1, 0x2, 0x6, 0x7fffffff, 0x80}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000340)={r3, 0x7}, 0x8) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x81, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:15 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802014d) 06:37:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068c0", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x0, 0x100) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) ioctl$KDGETMODE(r3, 0x4b3b, &(0x7f0000000180)) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='celh\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0xffffffffffffffff}, 0x28, 0x1) 06:37:15 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000180)={'ah\x00'}, &(0x7f00000001c0)=0x1e) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x4e}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r3, 0x401}, &(0x7f0000000380)=0x8) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r2, 0x28, &(0x7f00000001c0)}, 0x10) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000180)={0x3, 0x0, 0x2, 0x0, 0x0, 0xb3200000000000, 0x77f, 0x1ff, 0x8001, 0x3, 0x6, 0x80000001, 0x0, 0xa4, 0x0, 0x7b64, 0x0, 0x1000, 0x80000000}) 06:37:15 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802027e) 06:37:15 executing program 2: r0 = msgget$private(0x0, 0x40) msgrcv(r0, &(0x7f0000000000)={0x0, ""/106}, 0x2bc, 0x0, 0x0) 06:37:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x1) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000001c0)=""/62) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='cexh\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:16 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x80200c0) 06:37:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000001c0)=0xffffffff) r2 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceXh\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068fe", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x208000, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f00000001c0)={0xffffffffffff0000, 0x5, @value=0x7fffffff}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000280)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x40000, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000280)=""/255, &(0x7f00000001c0)=0xffffffffffffffa4) r2 = accept$alg(r0, 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_netfilter(r3, &(0x7f0000000ac0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000a80)={&(0x7f0000000540)={0x508, 0x7, 0x4, 0x0, 0x70bd2c, 0x25dfdbfc, {0x2, 0x0, 0x2}, [@nested={0x2f8, 0x14, [@generic="f3f04a2c5e3f5f7b146234893a6d0b5a59bd6323020c1f2f809275f47f939602f15d5064074cb53c0fc5763ace950e704045dde43f732192d6660ca8534b63ecaf2355a74ad3c1435052a76c163787b860d33415999927f6c91ef1afe5beaa899290ef324148ba3af92369aeaafd6c746dc27ea57fb79d6cfaf020ee06a75e868a1ee186e885c2370753553f54c426e1952c987163f635e9582c23563b9abdca055da8978a20a0fc97af9687cbd496de63aa9df05a5c973f46227949ed65f1f90729dc78458e2a548e6d422fd7ee446dd6713fc74c5e5db4198936c0c28361382df14dddff4b28", @generic="331496c5f9a17187c54cda03ed3c2e77e5e070c68698ad5f75cf6fb0aacbb3dfc236ff19fdf36f5b4648c7c6336e79", @generic="be45e29d7d2842eea92d15c611f2e577a94e6ee450dfec537bee5f957bdfaed98147496ad1bee20badc342c8a22cd3227a37d93513739e7ff603e696752348e02ee611adb7d6e861eb2b", @generic="8fd5e1a14d14301f7cc536ef419c853bcd1e9c508621465153927ff92287e60f287ec9221199d6d16ea14b726a645da61fdf89b7546be8aae9b1620ea32c50a3fec406a4566445f65ec3780f859e88b11abab604e6a941b0da69558f3efb58487c18e43905b06e23d0ee6213f096d6c1023fc8f9162a3f35663cbd5ac25552439c53c455b43c019f35cfb786d338032b68937b2d1d2012c15eef26", @generic="b7eaacfd849d05d66f3b842620055168234224bb2fead3712cf7ef12ae314274a8be394bffa947a2df7c0888c7c71a3bb7cc73025e5c7cdab19c4bf7e2b3cdd8f7296d52e6d12f026cccfc213d278729848efbd7eb2d591fcc265e9ffdbe567ffbf9aaad824d3a406a6a1bf9ea6e0a5a6efb11845474374f058d6fe1cc82a47eab4ab208ed325ff7628b2f37d2f31bb45d4c1bd1d21585fe49fa2616eb1f34aeb5b04d8cf5c13f0ccbbcdeff4afc3599f56f94adaac54ee0f6d6e59104c1cac098ab1bc964b3715b16032f7fe90d2cabf648696b1e8b978b3b8d0456d7e8d6289d2a1741948d20f8bf6bcdd89fb390acad7e66f38f5e137f"]}, @typed={0x8, 0x82, @ipv4=@remote}, @nested={0xb0, 0x23, [@typed={0x14, 0x77, @ipv6=@mcast1}, @typed={0x10, 0x17, @str='md4-generic\x00'}, @generic="54921e2f41479e36b65f0d8ff78d31f4f90d820a80cfd1c9e58812ef41d0e600879824551e4c386298d2e6a009066e0e4dc2ac57c7afcc42cc90eed153dd635031d7042b4c8f276da767c3f1c4f82b93f46bc830d8be93ad0aa31783d06c60e1882ea3e31ca0e57ac35cbbe13af98af98c89347bc9c8206e3ae59535e3578a1f3e4c0aeebb"]}, @typed={0xc, 0x9, @u64=0x100000001}, @nested={0x1c, 0x3d, [@typed={0x8, 0x89, @ipv4=@rand_addr=0x10000}, @typed={0x8, 0x15, @uid=r4}, @typed={0x8, 0x8f, @ipv4=@loopback}]}, @generic="2fe643e0e04fac426d98e5c35876a022c1dbdf75af81ea6e78f546f9", @typed={0x4, 0x9}, @nested={0xfc, 0x95, [@typed={0x14, 0xe, @ipv6}, @generic="f3112162e13a2a85b94fc2be0b2005a1816c5b4af26d387a7cb4b64468e0aa2788343fde58f4b36b93ebc782c70333f362d1e256f596021e801cab7557437e3a1cd9a9379a823276929db36a0f54c61b74d1bd533a9de06240e5aa7d94b8ecdd5c762993d86366dcdf5db936e895c441ab616dbfb97153620b6ba629bae2705c9564636f00c5cd867a7bf51d3e57e09c8eaef5d1589a460999eb8647df0c6f54689d26c40999ae6db7e978e23743dca267a194bff260d6f19947132f6f6783c01970fdef01e41c49006238f5c5c580a8672b1bdcd550e45aed32e6", @typed={0x8, 0x5e, @ipv4=@multicast1}]}]}, 0x508}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000003c0)={0x2, 0x3, 0x4, 0x0, 0xffffffffffffff00}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r3, 0x8008ae9d, &(0x7f0000000400)=""/16) arch_prctl(0x1004, &(0x7f0000000380)="ca882b5965cf78fb7ee7b5830a207c1ad4aad277beb89fe39ec1") sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:16 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020245) 06:37:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ce*h\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:16 executing program 2: r0 = msgget$private(0x0, 0x20) msgrcv(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000003d9489092700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x72, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x9e6b60c3248711e3, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @loopback}}, [0x4, 0x100000000, 0x3f, 0x4e, 0xffffffffffff981b, 0x21271254, 0x2, 0xdc, 0x6, 0x5, 0x9, 0x4b, 0x1, 0x9, 0x1f]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={r2, 0x800, 0x8, 0x8, 0x5a2, 0xffffffff}, &(0x7f0000000240)=0x14) 06:37:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:16 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802014c) 06:37:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068c0", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000480)=0x6) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000002c0)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000400)={@ipv4={[], [], @loopback}, r3}, 0x14) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000280)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000440)={r4}) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000180)) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f00000001c0)={0x2, 0x4e23, @remote}, 0x10) 06:37:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ce0h\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:17 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020150) 06:37:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068f6", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept(r0, &(0x7f0000000280)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000300)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000007c0)={&(0x7f0000000340), 0xc, &(0x7f0000000780)={&(0x7f0000000740)=@newlink={0x28, 0x10, 0x208, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r2, 0x8c8c, 0x10000}, [@IFLA_CARRIER={0x8, 0x21, 0x6}]}, 0x28}, 0x1, 0x0, 0x0, 0x5}, 0x1) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000380)={@dev={0xfe, 0x80, [], 0xf}, @local, @mcast1, 0x0, 0x3, 0x9, 0x500, 0x8, 0x1000000, r2}) r3 = accept$alg(r0, 0x0, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) getsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f0000000440)=0x101, &(0x7f0000000400)=0xfffffffffffffe56) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x4100, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0xfffffffffffffea7, 0x0, 0x0) 06:37:17 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x80203da) 06:37:17 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = semget$private(0x0, 0x1, 0x10) semtimedop(r0, &(0x7f00000000c0)=[{0x5, 0x40, 0x1000}, {0x0, 0x20e, 0x800}], 0x2, &(0x7f0000000100)={0x77359400}) semctl$GETZCNT(r0, 0x3, 0xf, &(0x7f0000000000)=""/131) 06:37:17 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x4e23, 0x8001, @mcast2, 0x1000}}, 0xfffffffffffffff9, 0x0, 0x3, "d485c2d68539025bb6e22e02c93fff35759fc3ee05121445fa29433a3b6e81ba4614f9ef96a7f24c15e8889daa7d0d6649dd88d31fbd117ef8ac2bec599b8576e7946370c8e86d67b022db40a180f708"}, 0xd8) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:17 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x3a9002) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000180)={0x0, 0x0, 0x2080}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000100)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000002200)={0x7fff, 0xc7a, 0x2}) 06:37:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceuh\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:18 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020243) 06:37:18 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) readahead(r0, 0xbe4, 0x370000000000) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000180)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r2, 0x5}, 0x8) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r3 = accept$alg(r1, 0x0, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) openat(r4, &(0x7f0000000300)='./file0\x00', 0xf7, 0x180) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ce+h\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = add_key(&(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000280)="cfb37770d39c6ebe8ae2e5aa4497db778eb6071c8c3ca18e1a5f0a9d6ba55a4d8cc26124994074ade7bf59c7efd8f16d43a497ae11c19614dc44623c16bd19c622cf4f9c95187fc3388dc5a36e2c8303dd9c45c8a836aeb51fb27122a3e9450d53406dd3", 0x64, 0xfffffffffffffffa) r3 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x8, r2, r3) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:18 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020008) 06:37:18 executing program 3: r0 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0xfffffffffffffff7, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000580)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$llc_int(r0, 0x10c, 0xe, &(0x7f0000000640), &(0x7f0000000140)=0xffffffffffffff49) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000180)=0xfffffffffffffff8, 0x4) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}, {{&(0x7f0000000500)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="10010000000000001c0100000500000021040dbdf06dbbb780d2057a46d103f8482de87731fc4041980eb20a428bdd7f25782ce953dd100e10edfd13ef941f89ecf160bc2b70b898bf924c5ca78a58a9a7ff47641c32124055d52283ec3481e7122a0e9706a0f475ec2498071d95a1eea13b74b946eaa0605378d76331a1dbcb4610053b6c28ef4450587fe21f9aa77be8d96ff8af9273ad745b4408c5b315234ab6c9fffceebae8a5fa3ea671ddce5f21ba845447619412d4a38e22a9541829598497fa986f9327913edffc19fc986e128a9a2a930832b709dea99b05be24b03fb83fdda101349afabf4e6653749c1ef5a7dbeb3a9dd715bcc08804fea005362a395a3d678fca351d89d2b7985abf003800000000000000010000007f0000008080efd4ce7ed263e8bf29a70315c5d78e28406dd10bd231ca27c6c2fdbc3eb59db500000000000030000000000000000b01000080000000638c33ecfe926cbbf6f410bd9766634d193ff74bc1266f802dd2482e66000000e0000000000000000901000005000000f3aee76f901b4a3f95c4d94b6830ba00b6c0b5ed6d207a42349a42f7f9e90b6a7e5393a2197c102bf2a7421f7fbbe473b5119a6e0b7ebd6fd14217e621c3b3ccc8b547b87184aa2b6f2c53b3a60231521d61a67e3ae0ce83225becf452c02ffaefcc6ad4babef2e5a028aed644cccd730841aef959b575eddcfba0b9202abbc5403d7b5acef7000cd1069f1a9bf215d5c1b7361c88d3f9f69e0495b2f648a237b348ebcf6f0002f1064c98d967aa5b2abcfb698ffd7adb378aa5845d8b19962708129ededc1926b8af1d9c7b00000000"], 0x258, 0x20048090}}], 0x2, 0x0) 06:37:18 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)=0x0) perf_event_open(&(0x7f0000000400)={0x7, 0x70, 0x69, 0x8, 0xffffffffffffcc86, 0xff, 0x0, 0x7fffffff, 0x1200a, 0x1, 0xfffffffffffffff7, 0x8, 0xfffffffffffff8ce, 0x85a, 0x1, 0x3, 0x9, 0x70, 0xe6, 0x10000, 0x0, 0x1000, 0x401, 0x0, 0x3, 0x9, 0xe77f, 0x0, 0x8d, 0x10000, 0x5, 0x4, 0x1, 0x5, 0x101, 0x8, 0x7, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f00000003c0), 0x1}, 0x1000, 0x8, 0x9, 0xb, 0x2000006, 0x8}, r3, 0x2, r0, 0x2) r4 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) ppoll(&(0x7f00000001c0)=[{r2, 0x2}, {r2, 0x402}, {r4, 0x20}, {r1, 0x1000}, {r2, 0x4400}, {r2, 0x40}], 0x6, &(0x7f0000000280)={0x77359400}, &(0x7f00000002c0)={0xfffffffffffffffe}, 0x8) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f00000004c0)={0x4, 0x0, [{0x80000001, 0x4, 0x5, 0x50, 0x4, 0x7, 0x5}, {0x0, 0xffff, 0x4, 0x3, 0x4f, 0x1, 0x4}, {0xc0000019, 0x1cd4, 0x0, 0xfffffffffffffffd, 0x10001, 0x6, 0xfffffffffffeffff}, {0xc0000007, 0x800, 0x7, 0x3, 0xffffffff, 0x8000, 0x5}]}) ioctl$sock_bt_hci(r4, 0x400448fe, &(0x7f0000000300)="137713e606157010189fd04ca3ed9587dd44109273ab2c67d8684aadbabc0b61878d04d7d40b9c382efa191bddc98a5533eb176fb7da02fcb45a94ab5c4d146abaffe37956c7f12cac360b49eabd26638a17ca8d412b73e5a0db64d0da8fe3e64f02a5b5aecb42e52175504d64c40d65f098f705c5ebea892f830f4887a22df15f8697f91f6dc21324374ac66354f909510e24f0df2c8a8b3c5be0a94544813f") sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) getpid() 06:37:18 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) sendto$llc(r0, &(0x7f0000000100)="1ba2be6f20ba26fb3820621dd2b033453bd38beb426f76f79de9b8353619473660253b7195c019556d024f9aa477525e3cb7f844b07757456bc23cb489d0c7776509e6812fcfc57f088aa9c03d18306e27653b5784a57c9ce5ef4a1447480fbb85e35cfb52a920e46b73cf05b312ab24e1aea90cd846ba57a23b26d3ae3606bfd8156939bb6f6cc52e21bae42aa60a81e52aa6ebba17c18db9dfde4f13824401d0969692d0c50498182ba246f4729a3390639118d78ba8267848c0f14e03fc5f03559ae474090b22d049e2e779c7f941eea4773bcadce424904dc23bf92c76b498c8ff6de78a36131ecd29d6e08c164011393af5c754e865", 0xf8, 0x4040000, &(0x7f0000000040)={0x1a, 0x327, 0x1, 0x4, 0x4e71, 0x100000000, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 06:37:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='cech\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:18 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802027d) 06:37:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ce.h\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:19 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020180) 06:37:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ce-h\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:19 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020a00) 06:37:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x1, 0x40) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f00000001c0)) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000002c0)={[{0x8, 0x3, 0x82c, 0x70000000000000, 0x9, 0x2, 0x3803, 0x0, 0x4, 0x7f, 0x9700, 0x5, 0x5}, {0x1, 0x81, 0x8, 0x8, 0x0, 0x812f, 0x6, 0xff, 0x4, 0x8, 0x1, 0x9, 0x100000000}, {0x400, 0x8, 0x7fff, 0x6, 0x6, 0x0, 0x6, 0x7fffffff, 0x4, 0x1f, 0x6, 0x3}], 0x8001}) faccessat(r1, &(0x7f0000000280)='./file1\x00', 0x8c, 0x900) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x44800, 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f00000001c0)={'nr0\x00'}) utimensat(r1, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={{}, {0x77359400}}, 0x100) bind$alg(r0, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-aesni-avx2\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(r3, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:19 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101100, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x4, "1c702a75"}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000140)={r1, 0x5a, "0911b150c7cc4cbb1e96c7b36372f5230e3fa3dd7517f02788081beff192bf278f3244588419c0eae7466581d34d15e30714c380e925d37462a3084a00a91f6ee07f26524fc4717f1a7d875dee1f6852c1082a22c7b60ea0ae91"}, &(0x7f00000001c0)=0x62) 06:37:19 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020740) 06:37:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x2, 0x4, 0x1, 0x2, {0xa, 0x4e20, 0x8, @ipv4={[], [], @rand_addr=0x40}, 0xfffffffffffffc7e}}}, 0x32) 06:37:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceoh\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:20 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802024b) 06:37:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ce#h\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:20 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020010) 06:37:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000180)={0x5, 0x5, 0x7f6e}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f0000000640)=@can, 0x80, &(0x7f00000000c0)}, 0x2}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000300)="d530315faa73e9a79f8298b6c7f8f26fbc2e280b53e8f6cbfb38e8e0715ee53428feb97f925f386beca39ab33834078f8608fe8ba95b55cfc683347259d82c4d9d22922aebead10c3de1dad4515f4ca7c6fd91ad5f3876e5135e6ff412a18a8b29936447dfce1685dfeaf68dc1320a3f3977f5d7ef6baebdc9de4158c877e0631982337e51573041119fbfe183e5a3750b0755849e6624593de0006ed268966623ce7fa3ff910a866afb786466f4cc4c3c281ebde452142754b2b76345a4b5a4f6064cb5a6ca9cb7b4aea76276337c861a83f0", 0xd3}, {&(0x7f00000006c0)="d552040000162a4c211cff7f0000000000062cd9c4256380e1cfbbded657da80c0c1786dbd48d7777bbc001106d6d9c4e58c12d9801b699db4225ae6c8746cbbb80a09c899fb57e8c063402f2beff9abbfa5d9a44a9147acda969c51111fd84cfc9c4556951f152cd8c5d49ee28d545f3332e60132e2ad3732b78060c212f03cc01105a9", 0x84}, {&(0x7f00000004c0)="616486098affb93001004a71c762ef25d95a0318f7c7e7c934b8cd5a604ec4a65eb92781c3b7f048457ccc9d1869c1481afb42bd6b683f68454eb770b67843a865bd0b00cf8929b3c60e04d8b3f3a158333270042b1f178db1", 0x59}], 0x3, &(0x7f0000007b00), 0x0, 0x8884}, 0x2}], 0x2, 0x8) setsockopt(r0, 0x70, 0x4, &(0x7f00000001c0)="a765244741344862af08998afdb77eca449e81411f72706b8a0050eb57a1cfbb8f30189b9e1fe8e3c15c6272043ae9b5e7ee5b6e9dfba7", 0x30d) bind$unix(r1, &(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e) 06:37:20 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) fgetxattr(r0, &(0x7f0000000180)=@known='com.apple.FinderInfo\x00', &(0x7f00000001c0)=""/19, 0x13) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x301100, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000002c0)={0xfffffffffffffff7, 0x8001, 0x81}) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r3 = accept$alg(r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:20 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) inotify_init() r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r2 = getpgrp(0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x8000, 0x0) r5 = open(&(0x7f0000000140)='./file0\x00', 0x141083, 0x68) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000180)={r4, r5, 0x100000000}) 06:37:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='cedh\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:20 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020182) 06:37:20 executing program 3: ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff}) pipe(&(0x7f0000000340)) accept$alg(r0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) ioctl$PPPIOCGL2TPSTATS(r4, 0x80487436, &(0x7f0000000280)="f8aded3f2f7f4f614c9e15424fd18bc29a75689864509654293a518c994a8bcaa3f50d8308927ce9622aac226247a80642e2be5b046973ffe5a437f4ec1cc3dd518477f45c6ddc1a52da338a2225cc5340647d9ac5b6bb848288527d723d29769af7aee65983e177d48188874481a58ed98ef592cb5ac9bbf16eeb2826813366e1ed75f24295de") r5 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000380)=0x6, 0x4) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) 06:37:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:21 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = fcntl$getown(r1, 0x9) fcntl$setown(r0, 0x8, r2) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r3 = accept$alg(r1, 0x0, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x6}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000380)={r5, @in6={{0xa, 0x4e22, 0xffffffff, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x20}}, 0xa4b}}, 0x6, 0xffffffffffffff81, 0x10001, 0x1, 0x1}, 0x98) clock_adjtime(0x5, &(0x7f0000000280)={0x7, 0x1, 0x6, 0x0, 0x1ff, 0x1, 0x4, 0x100000001, 0xeaf, 0x8, 0x400, 0x7b5, 0xffff, 0xfffffffffffffff8, 0x5, 0x6, 0x8, 0x7fffffff, 0xff, 0x9, 0x0, 0x1, 0xe0, 0x4, 0xfffffffffffff800, 0x20}) 06:37:21 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020285) 06:37:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceih\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(anubis)\x00'}, 0x58) 06:37:21 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802029d) 06:37:21 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'veth1_to_team\x00', {0x2, 0x4e20, @multicast1}}) r1 = msgget$private(0x0, 0x200) msgrcv(r1, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x800) 06:37:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(r2, 0x10c, 0x400005, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:21 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)=0x9) msgrcv(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c72c0a992e7d6a88e452e961aec44d90fc9dabdacf4956ec89e1165e0c7af5c348d9171327be236f61cad8a372c3ea26bb78240a2d571320e61225b366ba6878788a2f03a262bf608e874a22d6b0697c6ddffd9ef4d9ecc2bffb5e72f84b379a005d9eda0e4eeb19a17a667ad3831367d106740d79091d9354d1145b86b9b2f83ac6c4622b0e7f8e9f235e073b4152c6a03debdbf0f3583ecbd000000"], 0x72, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x92080, 0x0) 06:37:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='cesh\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000180)=""/38) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:22 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020340) 06:37:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)={'syz1', "edd3b85df676909985d8ed20e7a8c926973ed242e28768c3d917294adb780776aac37510f6a22e4d8189d6d40b8a9d82205e1b5dd90dbfb524c6e9db0b4132cd0fbfea05e9a8e33e65e08068036331ea58fba5fa5c2e211ff23115"}, 0x5f) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0x2, 0x0, [], [{0x2, 0x80000000, 0x55, 0x5, 0x5, 0x1}, {0x800000000000000, 0x0, 0x8001, 0x6b42, 0x3ff, 0x9}], [[], []]}) 06:37:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ce%h\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:22 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x8a, &(0x7f0000000280)="baf8ecf50f6c78923e36d0ec25db9f24eda7ad9de01351678eb9159c6d813b42c10b5f338c23562239abbdb21aea1b4eaf5d6ac3c5c2e5bc2745623d0f8e4dd332e00c7a0f6a345a4e9f5ffdc4617e1aaf8398f4fa9918cddadcb83ee89b9177a98aeb28ec86aa372a947002795667474db7c0cd32ed23134eaa7393b3c0a4e02d4200e9138ddfb8713307efaedfb11e02c6") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f00000001c0)={0x0, 0x100000000, 0x3, &(0x7f0000000180)=0x69b5}) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000280)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000001c0)={r3, @broadcast, @multicast1}, 0xc) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000380)=""/150) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) 06:37:22 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020004) 06:37:22 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0xffffffffffff8000, 0x0) renameat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') 06:37:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='cep%\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:22 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020151) 06:37:22 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:23 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x3) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:23 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802014b) 06:37:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x8) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:23 executing program 2: msgrcv(0x0, &(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYRES64, @ANYRESOCT=0x0]], 0x1, 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x1) tee(r0, r0, 0x9, 0x2) bind$bt_l2cap(r0, &(0x7f0000000180)={0x1f, 0x401, {0x81, 0x5, 0x6, 0x80000000, 0x0, 0x8a02}, 0x8, 0x1}, 0xe) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x801) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000040)=0x4) 06:37:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:23 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020249) 06:37:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0xfffffffffffffee7) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x20000, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0xff, 0x10}, 0xc) r3 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) epoll_create1(0x0) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="647e81aa4a3ebc578c7ef474754a2c1126ede5de3a13341e1a31cd44e6d4ce6f70c1e6017724737f4aadb4c36756e7e7fb6865db2aa1b8fd66c85c47b3b6da98b2fbeb07f1e1bc78eda4cec5fa9b074dd8454bed2a68b35dca531935abb744d5206bc1620286c3dce28f82beeab9cd1b58f07bf4db690a204a8a00403d5feb5e07f4042f71c829140a58e1d693172cc77037aa88e440efe05efeb6", 0x9b, 0xfffffffffffffffe) keyctl$get_security(0x11, r4, &(0x7f0000000380)=""/118, 0x76) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000540)={&(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0], &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x2, 0x1, 0x6}) 06:37:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:23 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020185) 06:37:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x7fff, 0x0) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000280)="c20005d1f076f484e9027f35c95e4906cd0f15a158635eab35ed118e5836dfc004b93bc35dc973f827bf34ddab0290cc9c05dbcc9736bc12bfce6db6488351df9b13fc1403e743ed4389416cf7f967b58db56d827fa627b435d6774c788983c3826b50a35ed1d631") openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001400)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@rc={0x1f, {0x1, 0x3, 0x676, 0x100000000, 0x0, 0x9}, 0x6}, 0x3000, &(0x7f0000000240)=[{&(0x7f0000000200)="9a47dff3500ccb6d2ed758d220801a22b5461bbefa18ee59dd8f96"}, {&(0x7f0000001480)="8ea34e6de99244c1785b1645ea807a15b554b1b1e92d093dcbfa7acb438ba0f963da1ff3e56fa76f72e66f2475edafd0ddc524bdd470edeb1ead6db2ea0cddc8dc403c74cd62c228f7c0039d818c7aeff425266df0c6e4c8410c886bb7f8a7509efe19ccb6e7feb88f1dafee350ac97a7111b3bf88ec00637471679435fe113501fb68203b5238c05cfe05201eba272e7b1b4b31440c67d33c14bd20d7da4505f68d5ced77575e3bb391b6db93829deda1abc06b5397733d61670d5d911a31da842035cb46c3e6e89c6e7267d6ef8fe75a13459831c664253cfbef8184242aa7cd38130a386b97d349e49f7298d5b26aa76e538c27bf3cc1bbaa33"}]}}, {{&(0x7f0000005900)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @multicast1}, 0x4, 0x1, 0x3, 0x4}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00), 0xffffffffffffffb3}}], 0x3fffffffffffe0d, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r2, 0x10, &(0x7f0000000180)={&(0x7f0000000380)=""/4096, 0x1000, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000013c0)={r2, 0x10, &(0x7f0000001380)={&(0x7f0000000280)=""/239, 0xef, r3}}, 0x10) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) 06:37:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$getreaper(0x1b, &(0x7f0000000180)) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r0, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$key(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1b0}}, 0x4) 06:37:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:24 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802026d) 06:37:24 executing program 2: msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000d955d8cd333a40680000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0e9084bc3596164820baf9fb7d970c00000000000000000000"], 0x72, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400200, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000100)=""/176) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000040)={0x71d1e20, 0x385, 0x2002, 0xfff, 0x1, 0x0, 0x6}) 06:37:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0)={0x0, 0x2}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000300), 0x4) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000002c0)={r3, 0xc}, 0x8) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) mq_open(&(0x7f0000000340)='{vboxnet1bdevvboxnet0\\security)usercgroup*\x00', 0x840, 0x90, &(0x7f0000000380)={0x200, 0x9, 0x7, 0x1, 0x424, 0x6, 0x9, 0x7}) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000180)={0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$inet_sctp(0x2, 0x80000000009, 0x84) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:24 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0x3e, "977fef3d10dc338e99bc2f886a0e3a61207a120c03463b35b55ed5deaaf5e597e9f12e4c756375c3fff45a44e834f8dc9e2b222cfff96a25706059500e7b"}, &(0x7f0000000280)=0x46) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000002c0)={r4, 0xfa}, &(0x7f0000000300)=0x8) vmsplice(r0, &(0x7f0000000980)=[{&(0x7f0000000340)="91a99c3d4197bba022ffa01c1df3590e640b49fd7ac75d1b0ea83f5d9ccecee90ab8a0fcf7e14024ed3dd9c8ad6f6e934234e00d9ed8158063d388836c7b7a020e06f685aafc2fd31d76c0c46ec0777c4e3c494abd35b20cce1571adc12b623beda2f094e6dcf7ca46122bae7fd5819567c9405c8a21", 0x76}, {&(0x7f00000003c0)="9476b8d34fab18234eac292a2916fdc411bf8c8e703632b6db1942e3bb3b361773c422267c08c6f45f4abb0507eefaeee3f764b2c92ae86c65d93b5a7d959bd0fb1877e3a72a633feef9c779dd", 0x4d}, {&(0x7f0000000440)="3e1fcfea89cddb5c349b307b61b14e65ba63f24f224e72318f0d0b381b93811c00d6d3ffeec7e28a671407a6fbd1c33988487f15a2dd4646fe823e173d98a59e284fb232fd2ec5adcb82c57d69ebda91d30460207adab919e3e352c72f76a965afe4bc8afa04ebf34ef993dd2cab97cbf248bfaa230b8963541f2998a6c3b0dee568c957fc7c2bdf44a8be327e733f80856680dd6224a09b", 0x98}, {&(0x7f0000000500)="8da87974c6f65bbcc71a6c4886c959437f6ef29b9794cb3cb0fc169d89765c360dfb3bc78a888093ead2d49cd06fc017d31c56d0433022f8936f271917cda66a83e54c7d41ecd5a1c00206c59f6533296d4ebe9140da", 0x56}, {&(0x7f0000000580)="434c55172dfaf95f24825778e3dbf2cdcc8b6159b31d2283b7617fc329c0bb63637feee1b50357cffe6d671240158d953699bea017d5394716d1de93245555970cd556a18d9efd81d5af6402d00737bd267e10d4e0bab1c7814cd307bea262bf364469fa622958a3285fd072", 0x6c}, {&(0x7f0000000600)="ad96dd4f7d18d73d97b0646e8604db07e989f36f1164ae52e3eba74565bb832b8e4fae0082c8fcfb047df37768723ce0d31d", 0x32}, {&(0x7f0000000640)="7b81ea56ee1e963f21a18473367188ace5af841eeac4871d0554f78b9504760126c55125bf92e0d9705d78ab1f8f58d26a83fa0f227b9e9a120cec0e65d5e2a2c7f46a1402ef734704f590b90beb7555601763a036f21b92b29997cc223df36790fa1a06651905a36b890905edd8b41e578a851b7312cfecef9cae4278e5afaf06dc484b99b4259082b54f2c999636c9faf8e6130a3584dbd6633c0a9efd8e1debd3db413611c0c18a88081ec2f542bc7ac9f87b16717f5f1a48eadfe789befecea7348f66c7e411268e8deb8c11a09e9593a4ba54", 0xd5}, {&(0x7f0000000740)="d56d1455fc080fdf8a2310592a31816f5cd7daf6b06c7ed7256b544eb4afe0cead3b99cd6c95f5fe040613399c2291a0b7256fde02e220d95840ff5441c9af694381c2fe4df08a6b903776b494942a3701c2def18f81f8c4fabaa37dd0575ed22130079cb7a8f2acf1931ca1d2d3598303dc63e88a91b4264b8627e8874270f8ad84d2f3deac87285fb7a5", 0x8b}, {&(0x7f0000000800)="b812ee6f60b2396bc4bdc1d47989f800b09a6ea739051b8a622a7b8e9780563a9d586c8287801614b61f6f1db064a26af856b37b48be53b3ad0370657bcc60887670b177233e10649cf35114402a00c8519b4bbaf44c6b170c70b774281dfd6de9633a0d15b76b48e3711cf02aebf0e58b0dd2e2f1f16b7af256a1ed62a327bc8905a162024aefbaa926b5c46b262b09c5a5c5b16fe7cc070d0b7523ec2afd19b2b1d6e5f8bf4c7c6ad5b8", 0xab}, {&(0x7f00000008c0)="856f29504319e4a5236bdd8302b0e427b3123b292e762f58dc9d6ea243cece2618031a2e1209ab67e4fe925c734d9d8e2516bc19564cbf574bb72bbaa9ec9799944a3bccc0e4b0805c98662fa835dc16071e81919932f7096466596cd7e3d58fd1a1c8be66e5faf6b6af6ceb8313f9391bd8da21f7e7535994735cccae759dbafcf4d5af645891ec55f8b77d14da31b25415b1fc4c", 0x95}], 0xa, 0x2) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:24 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8024007) 06:37:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:24 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802027a) 06:37:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="6365706805", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(r0, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000180)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) dup(r2) 06:37:25 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x400, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000001c0)={0x1, 0x20, 0x1}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:25 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x10000, 0x20040) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x9, 0x400080) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000200)={0x1f, 0x0, 0x8, 0xfffffffffffffff0, [], [], [], 0x8ae, 0x5, 0x2f, 0x9, "d57a05fabbd2a0632acf3ef0cdca5a75"}) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000040)={0xfffffffffffffffa, 0xb000, "25cf7a732abedf9b1cbc8486ed595c410f047c236a837f52", {0xcc, 0xf2a9}, 0x8f3}) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x72, 0x3, 0x0) 06:37:25 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020184) 06:37:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x648040, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xaa6) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) 06:37:25 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020380) 06:37:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:25 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='bond_slave_1\x00', 0x10) r2 = accept$alg(r1, 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x11) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f00000001c0)=0x2, 0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:25 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802000f) 06:37:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:25 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhci\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000500)={0x0, 0x9}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000580)=@assoc_id=r1, &(0x7f00000005c0)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0xfffffffffffffd17) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) r5 = add_key(&(0x7f0000000380)='rxrpc\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)="bb4e4dae67a856166fe58f52aba4e6762d0dd5d5e71e4000746f54cf3d311ae0b63b42b40de2689015b87275b06c3e29ead32cadbc880a0be7b442b5b5e14c9300471156d0c12d42c93bf764acbac92239be3c479db3e339c739e052cad77657a89179279b7a5a9dc94b9a4fb1bf2635f5ef9161b12d1e2b45a0faa111ec801597c2b7b7ef4fca54f927904db9dbac7d891eed73bf5e5ad04d4338b11df4df95b96dbe608a2b4742bf88577d13dc117727921cd49881d1", 0xb7, 0xfffffffffffffffa) add_key(&(0x7f0000000240)='syzkaller\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="2b7c9729a7d8351ae8785432d0c271ebaa1aab61794a93f4277d3f73998dbbe60b1231be307a5303", 0x28, r5) connect$l2tp(r4, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x2, 0x2, 0x0, 0x3, {0xa, 0x4e23, 0x2, @empty, 0x401}}}, 0x3a) ioctl$VIDIOC_S_AUDIO(r4, 0x40345622, &(0x7f0000000200)={0x7, "6965a252396806fec9de2e986d29890be0623e34a5b452ca5461f64e1d49d78d", 0x3, 0x1}) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:25 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802000e) 06:37:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) pipe2(&(0x7f0000000180), 0x84800) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:26 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) fcntl$getown(r0, 0x9) bind(r0, &(0x7f0000000100)=@generic={0x2, "7ff7bf1b01170ada9ae89abfa8b9adc68b893d5a3e352f0e2451acecd65bc2adae3062a887516a77ab71d0abf79c5247a18772653a37c91863d93b6e8d62249554c5654262cd807c7448ae562a9b3abaa36e9e0dfb45d5cbdb3c9665405e15d9c4a97a35def285b8600ea39232dd169c026f39781f13a224323cc0948630"}, 0x80) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 06:37:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068eb", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:26 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802014a) 06:37:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x1, 0x200000) 06:37:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:26 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020247) 06:37:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) getpeername$packet(r2, &(0x7f0000000180), &(0x7f00000001c0)=0x14) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x100000000000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:26 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x80201c0) 06:37:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xfffff000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:26 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020240) 06:37:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:27 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0xa, &(0x7f0000000280)='mime_type\x00'}, 0x30) sched_getaffinity(r2, 0x8, &(0x7f0000000300)) r3 = accept$alg(r1, 0x0, 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x1) openat(r4, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x3111db598f876681) r5 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, r5) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r6 = gettid() ptrace$peek(0x3, r6, &(0x7f0000000180)) ioctl$SCSI_IOCTL_SYNC(r4, 0x4) 06:37:27 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x408181, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000100)={{0x81, 0x2, 0x101, 0x4, 0x1ff, 0x4c5}, 0x4d9}) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000000)={0x5, 0x0, [{0x9, 0x0, 0x4}, {0xffffffff, 0x0, 0xffffffff}, {0x2, 0x0, 0x1}, {0xffffffff, 0x0, 0x2}, {0x5, 0x0, 0x38b2}]}) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0xffffffffffffffea, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r1, 0x10, &(0x7f00000002c0)={&(0x7f00000003c0)=""/219, 0xffffffffffffff7c, 0xffffffffffffffff}}, 0x10) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)={0x4}) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r1, 0x10, &(0x7f0000000340)={&(0x7f0000000180), 0x0, r2}}, 0x10) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000140)) 06:37:27 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8024000) 06:37:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xf6ffffff, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:27 executing program 2: msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000cf00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x72, 0x0, 0x0) 06:37:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:27 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802029e) 06:37:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in=@multicast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000380)=0xe8) recvfrom$packet(r2, &(0x7f0000000180)=""/73, 0x49, 0x20, &(0x7f00000003c0)={0x11, 0xf7, r3, 0x1, 0x7f, 0x6, @local}, 0x14) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:27 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x9, 0x4) 06:37:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xfffffffffffff000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:27 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020070) 06:37:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xa0008000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000280)=0x4) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:28 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020287) 06:37:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xfeffffff, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:28 executing program 2: setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) r0 = open(&(0x7f0000000080)='./file0\x00', 0x240, 0x2) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000140)=""/215, &(0x7f00000000c0)=0xd7) 06:37:28 executing program 2: r0 = msgget(0x0, 0x2) msgrcv(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000000000000077be5526000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002227ad1b000000fda0abc0dec52f372200001f00000000000000000000"], 0x1, 0x0, 0x3) 06:37:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$9p(r2, &(0x7f0000000280)="9371b1d782c4e3e883a3e36b89391321e7a77e1e97c478ee1783e6ba3a53ac28ebbba4318d444699fcbcd4034496b4dbd0c91c3babd08fff3f4cbb5ae6fba2cf1b3501c1600aa1f33fc7a40489ff0c689dc40707437363c1b6f53e1ba15acf5a2d4e1c0618afa9dbc6ed9a38d1cd547be3387aa673283da7e1cfe2c1786c41b19ca0efea84697b48d1de12ca09800e267bd71383745243995f9173e5d45af2d9007ff273d732c25d0a8d7738bab71da7adad708dc9f0aa800a9661d03008777889ac0e1c192c7e4c5bfc14c21754e45a96743e59f81dd54d5c7c14cdd163193d3000e3a324fd1862963b0829ba436d598822f63d9cd1dc2ecc14359f31b4eb8aadb5ff77d90e7f1cd0c801eb71cbdb215add5066075b986c6aa101a63e388aa815a36d34068826b43128fb43bec0b4d849bd606145f7c5354416e177acb45ab30d512957a6af924e21c998fe9cfedea643c8cdf1779ad1bdcc9f6929d5f430d19a285b846edbbb257a2e6657d06599d0353ca3a20f690eb1cc8f6bf80c5bd34621c63bb9bc4bcc0f089eec91c9f7d6b88c280b0af916f615cea92271dcd00ce7ad6d83c42f7e19e90d2639a525e1ce6549890e832f3f39519d71100254847c6141bf672b0c11474d1a894e45ba64913a55fb09e57b8d65db8d14a6fd0c5dd1af97d33c24d18b3c0a40f6d7b73312a8306544f77a3ce5f25bb8b92ac4e1f578ce3820b071a6c192606005db09b4c21a590c43e70e15ea944271f2d4930bf8b00f9145676843ac073959cd2fab45c5da74a8fa16ef393c27ef99cb4fe2855299c1a84f05332b2e362e422f307a88aaf35ae359b23fce546961efabe4fbfa518b7118f59f50b65b835461af0bf363e91617791847f348e6c9d2a960e8a0ab7c8d848cda6e30e655020a6da193b08ec036a4103e02e6894c4b0c5bc3f8d38d6cc7f1ed8de96b149b0a35dc73aeab70e839aaabb575c637933fcfdf4b42dafff53bfcb4668f2632d81aff3f38aae2d0a9ff5f9abb65da5449b8291cfc4ac6b2fc162eda44e58d4ef6d636b99fdfb07e1b844d86aa57b07614249c9cb3dbab1125eca9b058b7cfadfe43fce830f2e57bff9c257ba9ad7a6250419df7c1d50b112b3aa3051a60013b9337ef3f85b5ebe7ef534683cf9e608518fa64b56e9b000e5f030b758c9e3bed529ebe2ba2f40a25f3ac22e39f8da205085d034377cf622e7335a10fe3d08b4e4e71392af19755c7d672e54e685ba6ab4ec7edf662554a2bed912bbbe64d4e7b6e9bfafba4a3a6616054d641ed3cb327ac8a46204f184064e87443f53a96a9961b9a6cd6f4c294d26b130bb9bb7f6106e658d6d5469d83a0a1bad3d30739e3a2f2b9b9fd45a3124099c6703957089f8f4189e78fab30b63da4f02126d57522252159c0c7098e14be88b4a256e54edfa4450ca4e0dc11bb808b0232bb096e872e8ffe31c2d658008de08b3533bedce60fe650e16ef9324769f861dee5e2d5b98baa9e5c2646068f70a2668f9f0f00db8fa16ec404e583c149b99fea1ac0f470ebc2233b5a8d26ce12b78f684f6d06da21e0ad56785667d6ff9dc1e542941033639869bd081e81842449cd41e4f7f2e576e290e22bff84a24e77e6032ab6d19e53b38821bb250e9b0f06623a26d2d6878aa35e35c54a8729f9fb21fd26472067e25edbcd7551c9a0eb5843579ca87a65feff7d8918bbefbce65ddc2b00580c35bc893ab986e139006cb6b933eb1bfa81c96bc5621ae6e64e8ece1d524ba787eef5914bf789225bbf777348015f28bcfe6e702db484c0dd1b808679a2303f50637bae7be9188e8881a4ba35ade730d0a61a6e5fdd7d04b158f6c8dc3f9bc3e50fbe2ae5901918db03f16857fc994abd290244d3ba59710db98c87d040d4859d4fd265d82864e39601ddce06259472706a84105ebfee363837f4fe6040c1063cb3d864dd96876a3be2d69cc33c8eef0e7384a535607edd2a92b05eedd25b44f92d78aed2d068e1eb6b92a1be6ad3c91656b74e173e9056261cfa1211d7c6c40dc3d929618ad7ba55ac1ca51d049cb4e926703f611e4445b3f71420f9533a6c34c8b36f39a87bb011b69358422b945cffb7848377311cdc2b65eefee2741a386976f06465c007be8c47aee2a55f3f875baf9b7fd76c46a162c0a8ebb73d3cf5d1521a08dd04a94655af879391325db0a05649d485512fb51228235f8d08b420147299d3275d232116f1f2bc391596a46274504811743b49cf18a7e28a7ed10f6ce24b5c049ac4e885cc414029262523644194de0ab804759f178cdf00c22f03f99ffa824221954737c6177f3493ff9eed4c9a29454b8fb9b2a5db387aa81f64a99a1d22015ca7856d9b3516ee8ce25c2088cee673d6b6eba23424318bd82ac7390219da8971cbb62538d38a7b6144cd9f2fa38780d9e03f91544add8a5f99ade74cbed9fc6a3dc5c9d740e161dd4b2c52aaab445265a7ff525f2d795c6de165fb526a0da532572b773b6c50390846f0bff4194e9a2b0b8ee78643d0dfcba660ef3d0d764c4dbd0f424d18eb4254e5b65bcf529892f5bf99033b0c64be928b6ae65cdf848d0c3269b57fdfdc937823afa2dddd5f3642430970a4bf100e84bd1e9257069c409a979609468cefe3e9a68e0dda537910895aa1030653bbe35a667687e0f010c723478cf744d1c18de7f2ffa9140d5960c02546a02d8ef4bed057e4adac7680b95f646abda30e333414f3dc8eacdef0dd5bceb43ef9220656c2127fabf2eea70fd7ba4cec7f032b57204b9a31be12779977a804ed193734ca3d6881807893801d07441c2268f10d1a194fa8206cf2f43a7b4868587a352db4bd224459ca587e14ba46926be501ebe32f36f8bcb2a0824b35897d47714e7e2800cd54b4991d7ad972e6603b032b60d57c7f90865f7c6f9591937007576e113e7cc1197f0e3f8c400da5d05096934f8f52ee8a216ae057b5aae85ecea47ec151aeb18d259242431f3e00d0511e8764704e0c18cd2ed7dd08873cf956b131442d20df78e028e3307dbacfaf518b99e5ed410a06ccd1b47561f7d859b51ba45eca4208077243e835b783e13c3892e9c8095574b958fef587f4f4a93383648698b106235fbfd908e38ba2435381803a4c2c7ce677c040d1f960134d5a63795f03ed8624443a2c4054982fbedfca05986bc8c9db55cd1ba1d9ccacc1f6c2fda16bb63a7ef8423e8ff450e100b5038d9024ba971942cd28b1cb55caa5e9c790178dc40df670fad58c29f417ebafb61bfbcadf6dcd6d8358209d54b9b177b585e1b6c06e2967dd453979d9d2575c484839cfef8aa913c42b5391f1e80df8307e0fefbc71b8e9dd8c78858a0dd55f9a3af5b7ca989f71823fe1dc6e2bcce75694ef673017aefb56dba4242bc5967f476f9d739813d63a4833c075263d53d3eb5def587779abf062ac55428294608ed994f737d6eef1abe44fa21f77fa8d51e1f7a2f74dc67307115e9a35228c8bb2790f546a815894313a1252196ce644475ad43b1da792f26d57b150991ca7a0459f343bedebe086ce594785a115be765f0c59fa573c1fad8802439b5a3831177e9ad030d67fa9160ca4212e6c4f1e963faf2693e6e7cc16c535bbcfc0a310169268cbbb6ead0fa8282e0c4d26a19c1bd9c8ed50c50747ee4ee517d93da598d6d3dfa693fccf10164ad3cf3973f4213aafd67e75ee8d11ce03de1da9674b377a78de316af31ff369749c7d0fc3ba148a1dd1e9b91eb798ec530aa0baba4e548c08eb82f5c4e3b0a7355bd24a39b5be369ed6b581dcf05a2c564987c00082cb0ea4697eac7fab6504cd5b43040bec6af32f32575649e6887c173e2793c25d78cbde70685b134559df4035e83ca2bc5f85e264ab53818a61d075591d42d0d33c9695d2f3b9295eb299bf3e0b26b291f40156604492052ff4e7f811427d3c24f6fbaef2f52103acb0d90686f7cb904fe1649ae22068e1dca309d5e6ac04ba0f927217bfe972c063cd43d70507b52fd4f16b790bc8cea9f5d254e2546f61e556607be5df6159188fe29dbc6987f1a5ea668f98d0811249364d09588862c38a55f5d73e3d67a23085a6549b2c90e9ff31f1204209f5be2e001563644928a703daa6c34039ccb3988b850570ab2a3e0e74ffcc428dcd38b6320d17847a944c240c0d1b7fe6108570669a6df1829c19b1e890c43e22796e69f0634fe15ad4c88e18c2ca8e6a280e20e185f9fe561f0401ee2a6021735fd08c2af455351cda0d686853decd51011fec94619c19a91993680d270f81f2c24c30a209a2fc6c944da847f183daea587c69f4219fcc48b361f537b148dca695ed6fca1fb7ea65202cee1cdb94dea9368aea3971d444e839c571a153dacdecfa071953553b9a8856a0d1d775360aae46b5ba8a7ba0ae2ada1077a4ccbf883fd9b895383c6aa00004e129d601e42a68015791f34d5aad79b7cf13a9ec358664d14e89fc9c6c8957fc518c0f4883890dc5646c3ea93e9271964f489ff67f8b2e8a92bae07ad3ea888568e3a74bd3ace921c908c74957eb54b308414647bdf2fd5cfe1282349d4c0e2b0465e96308a3708c6c8d5c5ad7eb5f699783a2a3e09b772346c6b8ced8049e11da53567a324ba46924b33cd129b0086713c3269ff1b583d2dd1046c1b7e6a1691a16341bcb78009f41f796a7d6fe3f70a03a133b20b53241a262f27039ddf4db76be6d0290b84502a833c9aa60edd3a2c3e94ea2bdf88afdb8154b0ae72d622a0999ad37e8acc0a52465cbec157aa5af0931c6d9cb974f414ce4ae7273b2f0a717356d9f7bb17d60dd65451143f197cc95310b3b9bc74ad1e23434fc22405a7e72dea61c04f570d792b157407371900d2c257e7ac28f52dc6e593e938c9301d37ca5a81bdc5eec87a2219c7e363c71792a524937e4a32dfb6aff56d0a1e04e173d5e371e85fb59a08c84b9d6d0c9dcf82a36570aa612982ebb6da3c0be2114066c722965e31a682abbd14bbe3f842fdc1f4f5322bdc018dd2056c05455a345548c20d0411ed8c5084344aab4b33a83ba1b03a6f95aeef26e09325ae68830d208feb8fdddc98bde416183e7eb6f90fdf8dc64e8cd240418158ed2271edf7dc7e00a2b3c2c6f0ff9a9e94d76e7249147f59317c1bdb9db6f0dd6c76f6ee9810ef358512349b4b6f0cbab40064d3fbc66519c4fe7b67b21466ad0a785fdfba812c4bbb10ca01a45fdd5bb1ca509400b7920ef133180e9f0f077f1e50792dbfcc831df039bb48570d50796f9d5df41b66e124a217267a31b38a51cda5e071e364153a301542e614da4848d5d4cb07e1b971e2be64a6ca5eacca7298920255f28c52d843a7eda94b4d7fd9bfa16e2522fb8634e0c69a9f011a4fbe49c4b1fa8c70997c0c79b26cea6e1e2e5e79f183faa564e96d2678d331c35c41ac6784700c26587200467af9cca7a5efb668d32d1e89a6a8ba05cdd7940ae24071a51bff00da1d84b33de1b19c86e3cc9caa350cfe8e4dba330cb2ee2f3e2d7b92f0e2ecdc5fa620bc8338d36b97bb0046d6e466d28f1ae2d6c8c44ffe6f7922d9db13f2b3397dc0f0a51786fc124ee9d9951e6eace4ad5ad0953ca98a442b6ea07278d36a23583ba9d4a1a2daa9614ddbdd21c0d80abd263a5dd674cd4b222ec446c4991315e8647b7c0ee19217c150a62eca2f9b503d685af3df0f5ac1e87b8c25a6ff1d89a0afdd1024f6215c25e5881ca9497f035f15302b4416ae6904557da8da27554023509f7284508dd99471d811a825b1a4134ea09fe7fc9fba24ce13bb741", 0x1000) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xfffffff6, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:28 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802014f) 06:37:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f0000000280)={0x1, @sdr={0x7b737f7f, 0xfff}}) 06:37:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:29 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020140) 06:37:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xc0ed0000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:29 executing program 2: msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000fb0000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x72, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x20000) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000040)={0x10001, 0x200, 0x10000}) write$P9_RWSTAT(r0, &(0x7f0000000b80)={0x7, 0x7f, 0x2}, 0x7) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x20, 0xb33, 0x0, 0x8000, 0x0, 0x3e, 0x2, 0xf0, 0x40, 0x344, 0x1, 0x7, 0x38, 0x1, 0x100, 0x9, 0x2}, [{0x7, 0x35, 0xd787, 0x4, 0x0, 0x8, 0x0, 0x6}], "118b38a5f224ea7f84f44ae6b8561f9df146233d7c0ab8e4b3ccaf75232d2b6a18c2a4282335542c2de8f93f263b3f967120c0cc8e86cc4f7476930e3570ea06c1e930321a32c83c732af6fa3ec3dd537eb5e158b61fe88ab2a1abb1a7ba00834f409c41f6e7162b4ee9c85e35b200f074c7c3b5b97e715a80115b93f290d94c83c36692789b4cf3856f0f5fc81eca276588697818c737ebdd95be5dd897c6122a58318d626efb993230eb59bd961d1b9e6f6a0232c488c0cc32ed08694bc1cce08551f15c0c22258ad91f70b9b413573417070246731406740175487ed4b9a5d4974b3b41dfad0be18951045d58ef", [[], [], [], [], [], [], [], [], []]}, 0xa67) 06:37:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_mr_vif\x00') ioctl$KDDELIO(r2, 0x4b35, 0x6) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:29 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x3a1581, 0x0) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(r3, 0x10c, 0x10000d, &(0x7f0000000100), &(0x7f00000002c0)=0xffffffffffffff61) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f0000000300)={{0x7, 0x80}, {0x7, 0x8}, 0xe5fc, 0x3, 0x7b9e3756}) mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000140), &(0x7f00000001c0)=0x4) 06:37:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x4, 0x20000) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000001c0)={0x0, 0x0, 0x688}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000200)={r2}) r3 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x400000000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}, 0x9ca}], 0x2, 0x0) 06:37:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:29 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020280) 06:37:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000180), &(0x7f00000001c0)=0x4) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000380)={&(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x7, 0x3, 0x2, 0x3}) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000280)) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$RTC_AIE_ON(r1, 0x7001) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xedc000000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xfeffffff00000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:30 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x80203c0) 06:37:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="636570688c", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:30 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = semget$private(0x0, 0x0, 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x4000) connect$vsock_dgram(r5, &(0x7f0000000480)={0x28, 0x0, 0x2711, @host}, 0x10) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000003c0)={{0x10000, r1, r2, r3, r4, 0x42, 0x5}, 0x100000000, 0x6, 0xffff}) 06:37:30 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d}, 0x0, 0x0, r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, @perf_bp, 0x0, 0x0, 0x100000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 06:37:30 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020402) 06:37:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xf6ffffff, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x8000a0ffffffff, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:30 executing program 3: 06:37:30 executing program 3: 06:37:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000140)={0x1, 0x0, [{0x0, 0x0, 0x2}]}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x2000, 0x4000}) 06:37:30 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802014e) 06:37:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xffffffffa0008000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:31 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x80) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000040)=0x44) 06:37:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000340)={0x7c, 0x0, [0x0, 0x0, 0xc001001b]}) 06:37:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:31 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8021400) 06:37:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x8000a0ffffffff, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x4000000000000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:31 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x800000000000006) r1 = accept(0xffffffffffffffff, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) exit(0xa0ffffff) request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz'}, &(0x7f0000000240)='GPL\x00', 0xffffffffffffffff) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/215) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x9}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000540)={r2, @in6={{0xa, 0x4e24, 0x7, @mcast1, 0x1}}, [0x0, 0x7, 0x8001, 0x3, 0x4, 0x1, 0xa7bd, 0x2, 0x4, 0xec, 0xe53, 0xffffffff, 0x1, 0x101, 0x1000]}, &(0x7f0000000480)=0x100) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rfkill\x00', 0x40000, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz1'}, 0x4) pipe2(&(0x7f0000000680), 0x4800) 06:37:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x40000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="636570687f", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:31 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020403) 06:37:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xf000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:32 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020241) 06:37:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:32 executing program 2: msgget$private(0x0, 0x0) r0 = msgget$private(0x0, 0x87) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(tnepres-generic)\x00'}, 0x58) msgrcv(r0, &(0x7f00000002c0)=ANY=[@ANYRESDEC], 0x1, 0x4, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, &(0x7f0000000040)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x400000, 0x0) 06:37:32 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000000)) 06:37:32 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802024d) 06:37:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="636570687f", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:32 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom(r0, &(0x7f0000000040)=""/44, 0x2c, 0x1, &(0x7f0000000200)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x8cf4, 0x4, "e3942b9721dc91d107d6f097d96be88b24ce02bc3b2f9dddc377163f730567b885cb3efdb0f18c4765228b5105984146476d7811ba7ecd42f7b3d91674c421", 0xe}, 0x80) r1 = msgget$private(0x0, 0x284) msgsnd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000000740d89ff1834ed6b182e8fdb3f48c8bbdfe4f8d52ff64e177083027e224bbb57d5d1b78086eb8c89f11872f9ece4731c97871358b1056b69f5ee2e7eaac0f13dc0ff032fe5063fc0275ed39e11a728712754a4ff343da405ddffe3e0934802b200b8cc9439d7195db67f10a9319e5038400d4b1639cb8c20d288d44185ad81b0f7b5f5f4fae96ecce67e587e89ce28fd1664acdcacf6dde9724324a2845a838d2591cd6481275e4d0b500fff8929e398998c2ddf775712fb0780"], 0xc2, 0x800) 06:37:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x3f000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x40000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:32 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802040a) 06:37:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='cephc', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:32 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802000b) 06:37:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068f6", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="6365706805", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:33 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802027f) 06:37:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068fd", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0xfffffffffffffee7) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x20000, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0xff, 0x10}, 0xc) r3 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) epoll_create1(0x0) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="647e81aa4a3ebc578c7ef474754a2c1126ede5de3a13341e1a31cd44e6d4ce6f70c1e6017724737f4aadb4c36756e7e7fb6865db2aa1b8fd66c85c47b3b6da98b2fbeb07f1e1bc78eda4cec5fa9b074dd8454bed2a68b35dca531935abb744d5206bc1620286c3dce28f82beeab9cd1b58f07bf4db690a204a8a00403d5feb5e07f4042f71c829140a58e1d693172cc77037aa88e440efe05efeb6", 0x9b, 0xfffffffffffffffe) keyctl$get_security(0x11, r4, &(0x7f0000000380)=""/118, 0x76) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000540)={&(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0], &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x2, 0x1, 0x6}) 06:37:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xf0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:33 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x8000) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000100)={0x7, 0x10000, 0x7, 0x0, 0x7}) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) 06:37:33 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020183) 06:37:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0xfffffffffffffee7) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x20000, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0xff, 0x10}, 0xc) r3 = accept$alg(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) epoll_create1(0x0) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="647e81aa4a3ebc578c7ef474754a2c1126ede5de3a13341e1a31cd44e6d4ce6f70c1e6017724737f4aadb4c36756e7e7fb6865db2aa1b8fd66c85c47b3b6da98b2fbeb07f1e1bc78eda4cec5fa9b074dd8454bed2a68b35dca531935abb744d5206bc1620286c3dce28f82beeab9cd1b58f07bf4db690a204a8a00403d5feb5e07f4042f71c829140a58e1d693172cc77037aa88e440efe05efeb6", 0x9b, 0xfffffffffffffffe) keyctl$get_security(0x11, r4, &(0x7f0000000380)=""/118, 0x76) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000540)={&(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0], &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x2, 0x1, 0x6}) 06:37:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x3f000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ce-h\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:33 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x802000d) 06:37:33 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)=0x0) perf_event_open(&(0x7f0000000400)={0x7, 0x70, 0x69, 0x8, 0xffffffffffffcc86, 0xff, 0x0, 0x7fffffff, 0x1200a, 0x1, 0xfffffffffffffff7, 0x8, 0xfffffffffffff8ce, 0x85a, 0x1, 0x3, 0x9, 0x70, 0xe6, 0x10000, 0x0, 0x1000, 0x401, 0x0, 0x3, 0x9, 0xe77f, 0x0, 0x8d, 0x10000, 0x5, 0x4, 0x1, 0x5, 0x101, 0x8, 0x7, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f00000003c0), 0x1}, 0x1000, 0x8, 0x9, 0xb, 0x2000006, 0x8}, r3, 0x2, r0, 0x2) r4 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3111db598f876681) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) ppoll(&(0x7f00000001c0)=[{r2, 0x2}, {r2, 0x402}, {r4, 0x20}, {r1, 0x1000}, {r2, 0x4400}, {r2, 0x40}], 0x6, &(0x7f0000000280)={0x77359400}, &(0x7f00000002c0)={0xfffffffffffffffe}, 0x8) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f00000004c0)={0x4, 0x0, [{0x80000001, 0x4, 0x5, 0x50, 0x4, 0x7, 0x5}, {0x0, 0xffff, 0x4, 0x3, 0x4f, 0x1, 0x4}, {0xc0000019, 0x1cd4, 0x0, 0xfffffffffffffffd, 0x10001, 0x6, 0xfffffffffffeffff}, {0xc0000007, 0x800, 0x7, 0x3, 0xffffffff, 0x8000, 0x5}]}) ioctl$sock_bt_hci(r4, 0x400448fe, &(0x7f0000000300)="137713e606157010189fd04ca3ed9587dd44109273ab2c67d8684aadbabc0b61878d04d7d40b9c382efa191bddc98a5533eb176fb7da02fcb45a94ab5c4d146abaffe37956c7f12cac360b49eabd26638a17ca8d412b73e5a0db64d0da8fe3e64f02a5b5aecb42e52175504d64c40d65f098f705c5ebea892f830f4887a22df15f8697f91f6dc21324374ac66354f909510e24f0df2c8a8b3c5be0a94544813f") sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) getpid() 06:37:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:34 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020300) 06:37:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\r', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:34 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x106, 0x100f}}, 0x20) 06:37:34 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) 06:37:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xfffffffffffff000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x4000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x3f00000000000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:34 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x505180, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f00000000c0)) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000140)={0x10000, 0xffff, 0x100, 0x102}) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000040)=0x6) 06:37:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xa0008000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x2, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:34 executing program 4: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) r5 = open(&(0x7f0000000100)='./file0\x00', 0xa000, 0xc0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x7ff, @mcast1, 0x3000000000000000}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000300)={r6, 0x8}, 0x8) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:35 executing program 2: msgget$private(0x0, 0x200) r0 = msgget(0x3, 0x80) msgrcv(r0, &(0x7f0000000080)={0x0, ""/106}, 0xfffffffffffffed5, 0x1, 0x800) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x200000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000100)=0xc) getresgid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getuid() lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@broadcast, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xe8) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = geteuid() lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r1, &(0x7f00000008c0)={0x3e0, 0x0, 0x7, [{{0x9, 0x1, 0x1ba98373, 0x100000000, 0x401, 0x80, {0x6, 0x2, 0x1ff, 0x7, 0x5, 0x8, 0x1ff, 0x4, 0x8, 0x0, 0x4, r2, r3, 0x7, 0x2}}, {0x5, 0x20, 0x16, 0x2, "0f73656c696e757873656c6628237573657273656c66"}}, {{0x0, 0x2, 0x5, 0x6, 0xc1f5, 0x2, {0x5, 0x4, 0x4, 0x9, 0x7d7f1f7f, 0x82c9, 0x45b, 0xfffffffffffffffb, 0x7, 0x5, 0x708, r4, r5, 0x7fffffff, 0x7e9}}, {0x1, 0x9, 0x5, 0x4f37, 'nodev'}}, {{0x2, 0x2, 0x1000, 0x8, 0x3f, 0x200, {0x3, 0x100000001, 0x0, 0xffffffff, 0x4, 0x21, 0x5, 0x0, 0x1, 0x101, 0x7, r6, r7, 0x100000000, 0x20000000}}, {0x1, 0x100, 0xe, 0x200, '/}user,(md5sum'}}, {{0x4, 0x0, 0x9, 0x8233, 0x5, 0x8, {0x3, 0x80, 0x1ff, 0x7, 0xe08, 0x0, 0xbb, 0x0, 0x90, 0xfc, 0x3, r8, r9, 0x1000, 0x6}}, {0x0, 0x2, 0x6, 0x2, 'cpuset'}}, {{0x2, 0x1, 0x5, 0x8001, 0x10000, 0x8, {0x0, 0xff, 0x101, 0x9, 0x200, 0x15c, 0x2, 0x4, 0x7783, 0x5, 0x5, r10, r11, 0x5, 0x9}}, {0x1, 0x50, 0x1, 0x3, '@'}}, {{0x0, 0x1, 0x6, 0x200, 0x100000000, 0x6, {0x2, 0x4, 0x8, 0x6, 0xbc81, 0x7, 0xa4, 0x3, 0x800, 0x3, 0x8, r12, r13, 0x7f, 0x6}}, {0x1, 0x1, 0x0, 0xf785}}]}, 0x3e0) 06:37:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xf0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:35 executing program 4: ioperm(0x7, 0x3c, 0x3) unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001e80)='/dev/vcs\x00', 0x100, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000002100)=[@in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}], 0x30) syz_mount_image$msdos(&(0x7f0000001a00)='msdos\x00', &(0x7f0000001a40)='./file0\x00', 0x8, 0x9, &(0x7f0000001f80)=[{&(0x7f0000001a80)="d61620cdf2b30d50207ab29dd5888f90f8f479388a722165309983d1b8d162fd4cdc5894561444bf1552cb4e7304d1d3f6bdb5c6b546628e3c5963eb60ee796a68", 0x41, 0x2}, {&(0x7f0000001b00)="f8d0761d4e9c7ae63ba66d0a49eebcb7283b716f39cd0832892303f3c187f97b2ce496b665661dae836574bef21367aa45c5975392bf19c20b05612bb3a23753a948e36ceaf429fb68802f5f450b584be7c4838962d60de170851c7f49790c44b0139237aab469cb44f34fe6a634b7c122d0976fe629082b3a6e0704063e7e722b6874e2ce98af072bec84adf6a10ef67ae85c1ab519ba985ae16e8408dee5ce681444142dc6e5915c7cf56452a01a7ed7c05dab863c2e6f7711821dc5f4a2b9bb6c5e4087a98018a6e48371d60a3ce0b081b32c64796a4d88bfd5898ab3", 0xde, 0x3f}, {&(0x7f0000001c00)="3829e1b7529cb2a226975c5078be47d01655d90be0b4245c579fb59fbfe9f024a2da8d97affbbdb29083dde017e661f047122fffdbbd34d61b7b0d536e8e437ba88a0bf8754ec41e6815548e5c7cf96fe5dbdf6cbd06534a7744d8e9b1c56a18522680eb020ab06df7376b5a2e1f6c73f8b1aee068b49ea4f16c40663e70a120c5256ceb68bad455b9acb0213a89663c9d65f7dc1fd091cc1b9ae3bb6656c000f728a9d0b53715258513716d92326069d9d5fde5e70b48a8a213cec334fa1afd35fb883ee0240626c856343ec3e56fc80dfddbe2a6364b62d60a9c5a2cf88f058a3bb03af6", 0xe5, 0x1}, {&(0x7f0000001d00)="fa4e85401a099d4a30de119aa8f4f17264f82b2ca6056702c118bb22c8b8efe83340c3cf44f067daa61b0d676941f50812050606674f7f2f593fde252d158f13f6dceb31fab9fa5b8963090ed20a357ab6a076f1e93c8c67894ddf9a06b5fedf0b3ff041c885e29f4f8a938333bbe1a301614ecc66a291a5220369e287d1a7c44a", 0x81, 0x400}, {&(0x7f0000001dc0)="dd8e65c8ae89a8cb9953af9f1fb82a567155cc2ddeafa00b79d3a9e8285fadf0b350819d436686a1a7", 0x29, 0x4}, {&(0x7f0000001e00)="373b12e132364d2570820bfc8ad584586e68cecef6de58875c5cd25a045c2bf2649490679657250a07fb6eba1707875a304bd7", 0x33, 0x4}, {&(0x7f0000001e40)="0c004cc288daed0d85a7a20c405601ba3ff943b44134ebac0d3346d65092fe8d6b068d4a40d1ed071590510b277db2c3868773ec0a9ffd898add", 0x3a, 0x2}, {&(0x7f0000001e80), 0x0, 0x5}, {&(0x7f0000001ec0)="3f299ea18e4f33767e78d29df44ee298e09974d09ba05c04d8de3d6c31949feabf54be61df2f0bc379a91215f23da3d1c3f6ff7a324325296aaa3c353c022dba1b8f0b5a61493165213fae715a465fc1813c7067ae3ac3e1ae0f7ee5504adb6e1243a8c6700abbe165de9ffa765f2d8cd1da804d3ee487215eb5e09eae710e1c65d52ca0e37f118cf09e6f97", 0x8c, 0x80000001}], 0x200000, &(0x7f0000002080)={[{@dots='dots'}, {@dots='dots'}, {@dots='dots'}, {@fat=@dos1xfloppy='dos1xfloppy'}, {@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}], [{@subj_user={'subj_user', 0x3d, '/dev/zero\x00'}}]}) r3 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x402, 0x80) ioctl$VIDIOC_G_FBUF(r3, 0x8030560a, &(0x7f0000000240)={0x20, 0x4, &(0x7f00000001c0)="dfd2b2924b708cca06bf705c7617e446e216d2329d1c77c0f037f35573319877cbfe3d6094364a46351359", {0x800, 0xc234, 0x33524742, 0x3, 0x7, 0x5, 0x8, 0x100}}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x10000000, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) mkdirat$cgroup(r4, &(0x7f0000000040)='syz1\x00', 0x1ff) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x40000001000}], 0x0) mkdirat$cgroup(r3, &(0x7f00000019c0)='syz0\x00', 0x1ff) unshare(0x8020400) fstat(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000280)='f2fs\x00', &(0x7f00000002c0)='./file0\x00', 0x2e20, 0x9, &(0x7f00000017c0)=[{&(0x7f0000000300)="ef707210cfe1054fc3d0a11f596a126cf7e2daec48def2f9e72ad8", 0x1b, 0x3}, {&(0x7f0000000340)="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", 0x1000, 0x80}, {&(0x7f0000001340)="20e4b7a995ca9aec56fc1597e3ae32d22df559b7e488c103829b13a7699e1d22163491c2cf9b4da4da5237cd3e05cd277026da127c28cc3449720e15a31f97f832157b1ec398acf8103a2a50a98e08abcdbcf32258974b2ea1d2f7f65cd52d3e02e3324f1bba2438b48589739a07f934f29ad2994cbabd4ae8", 0x79, 0x9}, {&(0x7f00000013c0)="31add35c14f69e82a6cac10bc875b4c24fceae564afca50f5329e0d8704240a313b36e7ea0602875ec2bca7c6b0fddfbf77921b9c10cf7df624877753794df3f9338f69ef9f5daebf91bc71a7a490b8c3941", 0x52, 0x9}, {&(0x7f0000001440)="e472fb93a6536221dd16a6f3c86104c7c2b6ff0e6ed60205c73681b6ee0033f7655574ab08719c7e64426ab364a759afaad672970f3c4bfc3a60d66d3c57f391d9e6c35bde2f68067b41ce3d20aad5bc9fffcf098c9ca7f64bae08d8c90df09d27787153b1b84a8bc96e5c91e89fd4402096dd9de73b529b10701dec82aa157e0f5fd5c23d8e7c32dbfc4e7168311bd8a308c3c0a5d8d487c53ea7cea7c112f260685e8e06a17a8d9185b7bdf938548cead38802820d23074bba4872ab9e106b7da1a08cff2e4fbaa480ae295c0547e4887d7afabed54436d9", 0xd9, 0x963a}, {&(0x7f0000001540)="52ff0e58fbe87b0a7edf458ef6023937cdef174ae1116313cf685838378564c4dfd7eacbf3a97200343b91bac8dfe611c003b29fedb0a7ef13e63496bd0eb8c6e6c57da5274e4531046d7b473bbfeca0d542f39e3c001281a2e8bc7ee33226c93e0b3fedf5886aaefd1b2d054ac9583bd407920f5cac", 0x76, 0x9}, {&(0x7f00000015c0)="925a3c51c763bdd7b7c4e9b4665e8fa3", 0x10, 0xfff}, {&(0x7f0000001600)="f75a3cbfef51372fb657becbf2fc31da0b09437ec0ac61be92a8f032e8341763bd52f40444c2414226e5d6d9699757618c4ba8faf9e030663586ff2c7b8d09ba52eb076c4669300a6b8035988942cbe3674083e5c860140baa4b5abb2272123bcbddca2ffd3e415daab9fca208945294b690f4a1bbea7c48dac469edd1a8a5b5a5c5f3569df9a17d4e34dd2020c41d3d265ab1510e23f9434dda79a227b87a4af36fa6438fba9ba14f28526316650e6c51081889d25f603979c7a3e2bdf7", 0xbe, 0x5}, {&(0x7f00000016c0)="c3bfb0f7817f14d62c94dbfa085c8de2d846fdac70d4cb4581e24d2bee6f16f41178455cfe8f36297025029f271c8abca4e40fa1c91353cd2bf3586db3eae85ec3e517fc1f09ae9f5881d5725b02966f9927a9c6c69309c72c5c07484760360f9993241971d759386375e5a1defccac0e3c2114bb2827ecfb5456039555998982158a1bae73f49b844fb664b3a8bdbac67ff0da852bb87339ab3e9d0e9ea9864d8c0eacee7dad6eefd6e61ad330ee607a046041d5091d129ced2f9625e5207941c53dbd7e065e37b622d5d729ffe47e3", 0xd0, 0x3}], 0x220000, &(0x7f0000001940)=ANY=[@ANYBLOB='heap,nolazytime,norecovery,noinline_dentry,whint_mode=off,dont_measure,euid>', @ANYRESDEC=r5, @ANYBLOB='\x00\x00']) sendto$llc(r0, &(0x7f0000000000)="7cea99a8ba4cebd86d28caa16cfdda77fb463537ccbc7c07af77b5a5b43a038d2b718e1c216315e43583b0265e5a6a32cc857f2f080cbe", 0x37, 0x40880, &(0x7f00000000c0)={0x1a, 0x33f, 0xc2, 0x3, 0x7, 0xa2, @random="1c7ea3ebeea8"}, 0x10) 06:37:35 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = msgget(0x1, 0xac0d054f8e5688fe) msgsnd(r0, &(0x7f0000000000)={0x2, "2d17cf66"}, 0xc, 0x800) 06:37:35 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) r5 = open(&(0x7f0000000100)='./file0\x00', 0xa000, 0xc0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x7ff, @mcast1, 0x3000000000000000}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000300)={r6, 0x8}, 0x8) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:35 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000000c0)={{0xffffffffffffff81, 0x4}, {0x8001, 0x8001}, 0x9fc, 0x2, 0x80000000}) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:35 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) r5 = open(&(0x7f0000000100)='./file0\x00', 0xa000, 0xc0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x7ff, @mcast1, 0x3000000000000000}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000300)={r6, 0x8}, 0x8) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xfeffffff00000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:35 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000000)=0x7fff) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) ioctl$FICLONE(r0, 0x40049409, r1) unshare(0x200) 06:37:35 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) r5 = open(&(0x7f0000000100)='./file0\x00', 0xa000, 0xc0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x7ff, @mcast1, 0x3000000000000000}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000300)={r6, 0x8}, 0x8) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x200000000000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xffffffff00000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='cepho', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:36 executing program 2: r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x80) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000140)=""/153, &(0x7f0000000200)=0x99) r1 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x92, 0x240000) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f0000000280)}}, 0x10) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) 06:37:36 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000180)={r0, 0xfffffffffffffcd6, 0xcc7, "863aee84c49d6474ee7abaaca0c955b9eadaa0b02fd38463f56ebe4e505bbf2840b65df960650dcf3166c61767ba1d0a"}) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0xad0) semget$private(0x0, 0x4007, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000040)={0xd7, 0xffffffffffffff01, 0x193d, 0x1}, 0x6) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000280)={0xa30000, 0x8, 0x5, [], &(0x7f0000000240)={0x9b09fb, 0x7, [], @p_u16=&(0x7f00000001c0)=0x6}}) 06:37:36 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) r5 = open(&(0x7f0000000100)='./file0\x00', 0xa000, 0xc0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x7ff, @mcast1, 0x3000000000000000}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000300)={r6, 0x8}, 0x8) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) 06:37:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x3f00, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:36 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) r5 = open(&(0x7f0000000100)='./file0\x00', 0xa000, 0xc0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x7ff, @mcast1, 0x3000000000000000}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000300)={r6, 0x8}, 0x8) 06:37:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x200000000000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:36 executing program 4: r0 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000000c0)='{\x00', 0xfffffffffffffffa) r1 = add_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="87d5a9c099b2266d92dfcd11873e635694d14d264ae1eb089f9e449dd8159b9ce844180337a99d8e71aa", 0x2a, 0xfffffffffffffffe) r2 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x100000001, 0x210380) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000340)=r3) keyctl$negate(0xd, r0, 0x6, r1) unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_HAS_DEVICE_ATTR(r5, 0x4018aee3, &(0x7f0000000280)={0x0, 0x4, 0x8001, &(0x7f0000000240)=0xffffffffffff377c}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:36 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) open(&(0x7f0000000100)='./file0\x00', 0xa000, 0xc0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x7ff, @mcast1, 0x3000000000000000}}}, &(0x7f00000001c0)=0x84) 06:37:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xedc0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:36 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) open(&(0x7f0000000100)='./file0\x00', 0xa000, 0xc0) 06:37:36 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockname$unix(r0, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:37 executing program 2: msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e292133c000000000000"], 0x72, 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000100)={{0xffffffffffffffff, 0x3, 0x7fff, 0x0, 0x8000}, 0x4, 0x5, 0x2}) 06:37:37 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="6365706810", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:37 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x2aaaaaaaaaaaab0a) unshare(0x8020400) 06:37:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xfffffffe, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:37 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xfffffff6, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:37 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:37 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3b0e, 0x4000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f00000000c0)={{0x67, @remote, 0x4e22, 0x2, 'sed\x00', 0x4, 0xffffffff, 0xa}, {@local, 0x4e21, 0x3, 0x9b, 0x6, 0x81}}, 0x44) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xf0ffffffffffff, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xedc000000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:38 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8900, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000040)) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xf6ffffff00000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:38 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='cephu', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:38 executing program 2: msgrcv(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x72, 0x0, 0x0) 06:37:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x4000000000000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:38 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:38 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x2) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{0x6000, 0x0, 0x0, 0x200, 0xffffffff00000000, 0x4, 0x40, 0x6, 0x2, 0x0, 0x7, 0x8001}, {0x1000, 0x2000, 0x4, 0xe90d, 0x9, 0x214, 0x2, 0x9, 0x3ff, 0x9, 0x1, 0x1000}, {0x10000, 0xf000, 0xf, 0x9, 0x4, 0x7fffffff, 0x8001, 0x6, 0x3f, 0xff, 0x29, 0x5}, {0x1000, 0xd004, 0xf, 0x100000000, 0x3ff, 0xfffffffffffffffd, 0x5, 0x3ff80, 0x1, 0x2, 0xfffffffffffffffe, 0xfffffffffffffffc}, {0x0, 0x10000, 0xf, 0x5, 0x5, 0x101, 0x6, 0x10001, 0xfff, 0x8, 0x8, 0x80000000}, {0x2, 0xf000, 0x14, 0x7, 0x4, 0x5, 0x7, 0x4, 0x6f2e, 0x2, 0x7, 0x8}, {0x10000, 0xf002, 0xc, 0x0, 0x8, 0x9, 0x0, 0x7d, 0x10001, 0x2, 0x5}, {0x1d004, 0x3002, 0xc, 0x5, 0x1, 0x4, 0x400, 0x79e, 0x80, 0x2, 0x29, 0x1}, {0x6000}, {0xf000}, 0xa0000000, 0x0, 0x7000, 0x301, 0xc, 0x4000, 0x7000, [0xfffffffffffffffd, 0x6, 0x3ff, 0x789d2540]}) 06:37:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xf0ffff, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xedc0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:38 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:38 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:39 executing program 4: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r1, @in={{0x2, 0x4e22}}}, &(0x7f0000000240)=0x84) unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000280)={{0xffffffff7fffffff, 0x44b7}, 0x1, 0xaa9, 0x91, {0xffff, 0x20}, 0x7, 0x5}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0xc51d}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000080)={r5, 0x100000000}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) unshare(0x8020400) 06:37:39 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000240)) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000)=0x1ff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f00000000c0)={0x8, 0x465, 0x0, 'queue1\x00', 0x1ff}) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000280)) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000180)=""/144) getdents64(r0, &(0x7f00000002c0)=""/225, 0xe1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) 06:37:39 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:39 executing program 2: msgrcv(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008ac8e26b06727b04b51f75b4cc126a1a5b4bffcf164ce3188a2d02521ba66d668de03df8b12706ae0ae66d7ffad0f568df707150ead6a686d4d61e4ebe6114e4"], 0x72, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x80, 0x100) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080)={0x1, 0x5, 0xf6, 0x81}, 0x8) sendmsg$xdp(r0, &(0x7f0000001780)={&(0x7f0000000240)={0x2c, 0x4, r1, 0x37}, 0x10, &(0x7f0000001700)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="3b1cb4324ecd160c623e3395", 0xc}, {&(0x7f00000012c0)="62b3b2b655161ff4963c0109dde5c654b421866e5f17816efaaeaaddd7a6b02f4bb0c549659fca860b6c799e0edd0ffb4b28382507b41e39f04aab64f08e030454918d932c234f74c276a0a3e7c61bc2dab014b4b190388c3bddaa14abbe8e60c9ac8691c5af3f76a15e1e9ab4db1a47c9fde1820e5346d2e025ca24c80ccaa488fbd19a43ba025a547a0c212f329e6b467b2c74051a1a8d2240c5c549", 0x9d}, {&(0x7f0000001380)="c613fcd5af6c2b26d587a42b154ed35ea834546e2899fbba8057de8ffade007576f7134937e716d48c4dc61b60846ebe7b0a1e902b10661dff24d5174fb04bea0232906324f6cbcb661b48a74b67877f700efaf33d3ecbcf673afc64e68f50c5f1eb709bac8464be1d2cd00d440f5d57ac2e45b60a02afa22384774fc6774ee1488ddf9e3b105b102eed4bca14f5189d4ccea8f7b3bf7bc3bb4dd0223fa133", 0x9f}, {&(0x7f0000001440)="4b8c08303b3655e8473cdfdb9fb68a424357e5068fe849aba061833402df7dd6c9ff9945f0e098ec78cee074bba9c19c514412df98347e50ef0a8dec2f48ea0afadae8cc541380b81d9f8b2ca04e37305a45f7ddaa61eac3e8d4b1cd71732cb97c1b69d8fdf8bf948cf27ee0925eb97431b8cdaa8e02f2f190220d709d158879a04f007ebe1403b7b4864a1efbf97c8dc739c661934e532ae8a14bdf0bf25d4e4af4d9a0aec503f391c07d30ea29e7dce2e7381807a5cd2785c44ffc", 0xbc}, {&(0x7f0000001500)="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", 0xfe}, {&(0x7f0000001600)="b29153633fdd2d71539a13225ab35052d3e9238778a67cac724bc8778dca3d02196c70c79a99605f78415bc6e276c98d308b1f8c91f6f4bf3bac61df870fb56a36b7ed7d52c3893e826ae1786395442d60f54f08d9c4875d2c1083ac1bcc2aa5e11c023f93647369a060ec16012630aff4029a1da71fa99c9a7af5962bd244e0a27f39722be2d8da0ddd458d2ef0d5027e99765f9f21f1701a2e9f1a971137bcaf3833ca3c5a2da567fbe9cc45bc37241ca98df82f9b1878edea059eab0c21ed4107729d82fd264e3889ac6cb603f85c8418d7ff409e804f1a19312d70a2710d44e47c", 0xe3}], 0x7, 0x0, 0x0, 0x4000000}, 0x77773e677ddcd80a) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x20, 0x4) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000000c0)=0x1) 06:37:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xf000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:39 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x3f00, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:39 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:39 executing program 4: unshare(0x8020000) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x10000, 0x120) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f00000000c0)={0x5, 0x5, 0xfffffffffffffff8, 0xda, 0x10000, 0x81, 0x8}) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) arch_prctl(0x1007, &(0x7f0000000040)="fcb703a8c78f3d79cb7e81314e2dfb04105781b878d112712116f48cd7c76dead32b5ad91cdb05050f58b4") 06:37:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:39 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:39 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:39 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) io_setup(0x1, &(0x7f0000000000)) unshare(0x8020400) 06:37:39 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:40 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$peek(0x1, r0, &(0x7f0000000040)) msgrcv(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x72, 0x0, 0x0) 06:37:40 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) socket$inet6(0xa, 0x1000000000002, 0x0) r3 = epoll_create1(0x0) fcntl$lock(r3, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r3, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r3, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068a0", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x2, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xc0ed0000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:40 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xfb33, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)={0x9, 0x6518, 0x80}) unshare(0x8020000) semget$private(0x0, 0x4, 0xfffffffffffffffc) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xf2, 0x10000) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)={0x6, 0x9}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)={0x39d, {{0xa, 0x4e22, 0x3, @mcast1, 0x3}}, 0x0, 0x7, [{{0xa, 0x4e24, 0x2, @loopback, 0xade}}, {{0xa, 0x4e23, 0xffffffff, @dev={0xfe, 0x80, [], 0x19}, 0xa3}}, {{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}, 0x2}}, {{0xa, 0x4e24, 0x18351fbd, @empty, 0x7fffffff}}, {{0xa, 0x4e20, 0x6, @local, 0x8000}}, {{0xa, 0x4e20, 0x10001, @mcast2, 0x5}}, {{0xa, 0x4e24, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1b}}, 0x9}}]}, 0x410) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) unshare(0x8020400) 06:37:40 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r3 = epoll_create1(0x0) fcntl$lock(r3, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r3, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r3, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:40 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x0, 0x8, 0x7, 0xf, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f00000004c0)='syzkaller\x00', 0xffffffff80000001, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xc}, 0x48) r3 = epoll_create1(0x0) fcntl$lock(r3, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r3, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r3, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:40 executing program 4: unshare(0x8020000) r0 = semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) semctl$GETVAL(r0, 0x3, 0xc, &(0x7f0000000000)=""/3) 06:37:40 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) r3 = epoll_create1(0x0) fcntl$lock(r3, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r3, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r3, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:40 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) r3 = epoll_create1(0x0) fcntl$lock(r3, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r3, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r3, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:40 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) personality(0x0) 06:37:40 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = epoll_create1(0x0) fcntl$lock(r3, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r3, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r3, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:40 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x8000) write$P9_RSTATFS(r1, &(0x7f00000000c0)={0x43, 0x9, 0x1, {0xffffffff, 0x80000001, 0x7fffffff, 0x7, 0x1, 0x80, 0x3, 0x252, 0xdf4c4f9}}, 0x43) 06:37:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xf0ffffffffffff, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xffffffff00000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068a3", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:41 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = epoll_create1(0x0) fcntl$lock(r3, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r3, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r3, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:41 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000240)=@nat={'nat\x00', 0x1b, 0x5, 0x598, 0x3e0, 0x3e0, 0x3e0, 0x500, 0x0, 0x500, 0x500, 0x500, 0x500, 0x500, 0x5, &(0x7f0000000180), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x10}, 0xff000000, 0xffffffff, 'bond_slave_0\x00', 'yam0\x00', {0xa40478f1c36e620d}, {}, 0x67, 0x3, 0x48}, 0x0, 0x98, 0xd0}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x8, @remote, @broadcast, @icmp_id=0x66, @gre_key=0x8}}}}, {{@ip={@remote, @loopback, 0xffffff00, 0xff000000, 'rose0\x00', 'bcsh0\x00', {0xff}, {}, 0x7d, 0x1, 0x9}, 0x0, 0x208, 0x240, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x10, 0x200000000000000, 0x101, 0x1}}, @common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e23, 0x4e21, 0x4e24, 0x4e20, [0x6, 0x4, 0x81, 0x1f, 0x8, 0xfffffffffffffffc, 0xffffffffffffff7f, 0x0, 0x3, 0x5, 0xff, 0x1000, 0x9, 0x8001, 0x6, 0x1000, 0x40, 0x6, 0x8, 0x8001, 0x3b44, 0xff, 0x2, 0x6c0, 0x118, 0x7, 0x876, 0xff, 0x80000001, 0x101, 0x2191, 0x6, 0x4a3f, 0x0, 0x4, 0xc0000, 0x0, 0x0, 0x85, 0x1, 0x80, 0x5, 0x3, 0x40, 0x2, 0x101, 0xffff, 0x5cb, 0x80, 0x7bd6, 0x3, 0x4, 0x0, 0x5, 0x9, 0x67, 0x9, 0x1, 0x4, 0xfffffffffffffffa, 0x2, 0x8000, 0xffffffffffffffe1, 0xfffffffffffffffd], 0x3, [{0x2, 0x7317, 0xffff}, {0x5, 0xd39, 0x9bcd}, {0x6, 0x0, 0x20}, {0xfff, 0x401, 0x3}], 0x3, 0x2}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @empty, @multicast2, @gre_key=0x80000001, @icmp_id=0x64}}}}, {{@uncond, 0x0, 0x98, 0xd0}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x9, @remote, @local, @gre_key=0x1, @gre_key=0x8}}}}, {{@ip={@broadcast, @multicast1, 0xff0000ff, 0x0, 'bond0\x00', 'team0\x00', {0xff}, {}, 0xff, 0x2, 0x40}, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x1000, 0x0, 0x2, 0x2}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x10, @rand_addr=0x4, @local, @gre_key=0x6, @port=0x4e21}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5f8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffc00, 0x2) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000040)={0x15, 0x46, &(0x7f00000000c0)="9fa89013b0867872ebe9c74830706b441ebe8ba15c43a493db04a2b3fda2dcf04f6911966f68e5a93fb6ba07b243671fb726d536bc05ceeb588bcf6bca64fc703cccf6a06a9b"}) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:41 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r2, 0x0, &(0x7f0000000380), 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = epoll_create1(0x0) fcntl$lock(r3, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r3, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r3, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:41 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4, 0x200004) syz_kvm_setup_cpu$x86(r1, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000003c0)=[@text64={0x40, &(0x7f0000000380)="47dbef410f9955f40f00da66b80e010f00d0c442b5b607f366430f01c8430fea5bf5c4817d29d8420f16da66baf80cb87ca31383ef66bafc0c66ed", 0x3b}], 0x1, 0x1, &(0x7f0000000400)=[@efer], 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) mq_timedsend(r1, &(0x7f0000000100)="bde3d0f6017615ee921fcf072d8257b004baa010a60dd94a198568da827bac3592f326b418c5dac61a9aafd55810baa6460dad44c7022bf6f4e79a0d369273e50470f63f485bb7e6a68a3da69e3f2af5476271fa7830946706badcf60ecdc155dc3129737d5fc853a7ca50a5700bf333f21bb20a74caf5ffdb5c2820a46fe251b719ca5a369c6da293c109191cf5b08fd17f1e494fefcae79268a501fa73e542ee0b68a5deedf9b191f566345c4828f8dc23afb03ee36e0c79da3400ede903491d0f8aeac5d0860dc365a5f18fbc98e98cd3a6a12d43e1828a1da68d4dc68a918a1adbfd3d0ab7bfe495e4ec97449d6aa9", 0xf1, 0x9, &(0x7f0000000240)) r2 = msgget$private(0x0, 0x402) msgrcv(r2, &(0x7f0000000440)={0x0, ""/151}, 0x9f, 0x3, 0x800) setrlimit(0xd, &(0x7f0000000280)={0x3ff, 0x8}) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000340)=0x9, 0x4) fsetxattr$security_smack_entry(r0, &(0x7f00000002c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='/dev/dsp#\x00', 0xa, 0x1) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000500)=""/202) 06:37:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x3f00000000000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xfffff000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:41 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0xfffffdf3, 0xffffffffffffffff, 0x0) 06:37:41 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r1, 0x0, &(0x7f0000000380), 0x80000) r2 = epoll_create1(0x0) fcntl$lock(r2, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r2, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r2, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="6365706804", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x4000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x2000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:41 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000040)=0x75) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:41 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r1, 0x0, &(0x7f0000000380), 0x80000) r2 = epoll_create1(0x0) fcntl$lock(r2, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r2, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r2, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:42 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') accept4$packet(r1, 0x0, &(0x7f0000000380), 0x80000) r2 = epoll_create1(0x0) fcntl$lock(r2, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r2, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r2, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:42 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000240)={{0x2, 0x4e22, @broadcast}, {0x307, @remote}, 0x40, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 'bridge0\x00'}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) getegid() r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x1, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f00000000c0)={0x4, 0x2aeb, [], {0x0, @bt={0x81, 0x8, 0x1, 0x1, 0x313d, 0x6, 0xffffffffffffff80, 0x9, 0x81, 0xffffffff, 0x7, 0xfffffffffffffff9, 0x1000, 0x48, 0x0, 0x1}}}) unshare(0x8020400) 06:37:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="6365706897", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:42 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='pagemap\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = epoll_create1(0x0) fcntl$lock(r2, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r2, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r2, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:42 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = epoll_create1(0x0) fcntl$lock(r2, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r2, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r2, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:42 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) 06:37:42 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:42 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200200, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000040)={0xffff, 0x4}) semget$private(0x0, 0x4007, 0x0) r2 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f00000007c0)=0xe8) fstat(r1, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f00000008c0)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x7, &(0x7f0000000600)=[{&(0x7f0000000240)="8ba25111fc6b209d3179a623fe5730296e362e3fb136a94dd6f26e132e9fafbe8095f5b4aa9c30f9cad86c910fad75862a4fa8f059606ee7938e2e2c83448d5148db8f43b93ca59eceb2ec4a9d870b672eb8ade9dec74834bf7ec6cbba87249d261b8953c3b3aa39029b5865e476569277e2a5f1c33db9e1959c0ba1feb0e52ddd7fdee6d99a60a83fe7834a05509c807cec3b85703d847f237f5dfe5bfb11b67cb5297525f557e76ecd64e38a409542624051f947d2ad8faaae2d46dd9a3d62cc2a620c6d45877ea46a71222b722f", 0xcf, 0xfbc}, {&(0x7f0000000140)="070fe2eb12ab903aed45d923d6219b24d9f7f3955d0815753d3f84ea9eccfb82c35fe1e81a8181dc0fd78d668f5f976b67115373c7adeefb8fd4ac22db99a4f2f6da92612c05c1e37862adacc9af25db3276414d6a14f6423814b1a9ae3f289b85e441fe70c099d8dbb5049dc95e9cc7fd7bd57944384202a4c794a1e5dc7104f3c140ced346db760831417b3c997692", 0x90, 0x1}, {&(0x7f0000000340)="1bf7b61fd04bad9b0adfef3c0d4b9f7fa9ced3d2e946969f639115ed52d11b6ddc3de839c73c552a89bf410a682d9bdd0fe95bc2bd147e270d88806a1f1c6237b62c3bfbb5f7f420d7d98044042d159f7f37474f66554229cb547fb9b2095c19e8fd98358bcf124b0d432c7bef13c2f433b6db4782843a58349797ea2f12d9521704a84321f8d04aeca81640b1c45fbec7c9ca4a818f441aa850a92b5d76c1b2db60192bad80b4ac6ea3fbecd750d15a8e1359d68e407e2dcd394af61789e686f93faed10e9c6b4547f6dbc09e1930a219c42f9e255f96780429d835b5d57a04fe", 0xe1, 0x6}, {&(0x7f0000000440)="bc9bdb57e45114c4e454b5c300c1820deaaa17bf97fffcb411a547e3782489", 0x1f, 0x3}, {&(0x7f0000000480)="e2857710ab61bc014477747670ffe983d1cacf51bf2d33572e2a2e92bd9831e02363486b81a2766cdb23dd760adf927394ca95bcd239890548", 0x39, 0x40}, {&(0x7f00000004c0)="534080ffae6031f6bb2f3f64bb5bc08c8124280b8c2037d8c6d6f57d6a98363998c6e372d0ec785133908d31cb8c943ee16f3b4b8406035dd79195f3e640c856074079ce3878e03f18508ba1814606c2fe18c2121d2e1feec8d59787c59ad98edd3d6c867135ff5816dfc6275f067483833429aeabcae50e34dc1c3608c31920733f18d2a83037901f", 0x89, 0x16}, {&(0x7f0000000580)="49193cf15b193c630bc04f36575714d6419c28502a6787ceef4f1f92401054b900d79f99657404c53d79eb9dc1df2c7353f4ac284a65a2df42a51f353025be8bc2550ffc29dffd59b86f70a91caaa584565cf692f4f627a9", 0x58, 0x8}], 0x2000002, &(0x7f0000000980)={[{@gid={'gid', 0x3d, r4}}, {@barrier='barrier'}, {@session={'session', 0x3d, 0x13a}}, {@type={'type', 0x3d, "db832c55"}}, {@nls={'nls', 0x3d, 'macroman'}}], [{@fowner_lt={'fowner<', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x7ff) 06:37:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xfffffffe, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xffffffffa0008000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:42 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:42 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x24001) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x8000000004207, 0xd) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x200000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in=@rand_addr, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x1b, r2, 0x1, 0x401, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) 06:37:42 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x1000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xf6ffffff00000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:43 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000100)=0x4) socket$rds(0x15, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140)={0x40b78000}, 0x4) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000000000010000000000200000000000000000000000000000000000000e09c722b00020000000000000000000000000000000000000000000000000000000000000000000000000000000600000080000000000000000000000000060000000000000000"], 0x72, 0x0, 0x0) 06:37:43 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = epoll_create1(0x0) fcntl$lock(r2, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r2, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r2, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:43 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x2d, 0x1, @thr={&(0x7f0000000180)="42cf60dc1774aaffb23642fbaa3bc0ad8c11381d709eebbbb2aab89374c3d700e23c41640f32", &(0x7f0000000240)="c96fd4d9006c5403109fc77124b473241b341379d1aa1acc137470034c5c3b59fd2dfb0fca84c4181bf297f937adee91c7a88dd046f0bf88edf6b8a2330766d90fbfb1911496dea39c42c3f1a0764598195b397e805220dec90183c17b94739a497e648dc7a849eb998ebad4030e57a0bd6536c51f8101ab47683c28a8807a177c6fd1c96ab61bfeec2cca2e127679bc5c767598935e50604c99f15d801babc9f66960912ff50707b8ff04c65f49ecde7a84c4003b16f4e51e9f53d51f548e468b34f90052a4adabc6fa7ebca033a2170a3aa2fa86811380e8dad2ce88199869fad1e72a391fd38dac748918486d0b02e0482853a6f0d0f605"}}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x4800, 0x0) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000140)={0xf, 0x100, 0x4, {0x330, 0x10000, 0x5, 0x5}}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80000, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f00000000c0)=0x5, 0x4) unshare(0x8020400) 06:37:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x2000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:43 executing program 3: unshare(0x8020000) openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:43 executing program 3: unshare(0x8020000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ab", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x8000a0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:44 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c280000008004500005c0000000000019078ac1414bbac1414110504907800000000400000000000000000040000ac1414aaac141400442c00000000000000000000e000000200000000e0000001000a53c1820000007f0000000000000000000000"], &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semget$private(0x0, 0x3, 0x12) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/audio\x00', 0x400000, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000500)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000580)=0xfffffef0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r2, &(0x7f0000000380)={r2, r2, 0x40}) semop(0x0, &(0x7f0000000080)=[{0x0, 0x6, 0x3000}], 0x1) r6 = getpgrp(0x0) sched_getaffinity(r5, 0x8, &(0x7f0000000400)) r7 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rfkill\x00', 0x40000, 0x0) ioctl$VIDIOC_QBUF(r7, 0xc058560f, &(0x7f0000000480)={0x1f, 0xd, 0x4, 0x20000000, {0x0, 0x2710}, {0x3, 0x1, 0x7fffffff, 0x6, 0x3719, 0x3, "60a49b50"}, 0x0, 0x4, @userptr=0xaf, 0x4}) get_robust_list(r6, &(0x7f0000000240)=&(0x7f00000001c0)={&(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f0000000280)=0x18) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f00000002c0)) unshare(0x8020400) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f00000003c0)=0x6) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4000, 0x0) sendmsg$key(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xe, 0x3, 0x8, 0x8, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_ident={0x2, 0xa, 0x1a900000000, 0x0, 0x2}, @sadb_lifetime={0x4, 0x0, 0x400, 0x9, 0x7fffffff, 0xffe2}]}, 0x40}}, 0x4000) 06:37:44 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:44 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = msgget$private(0x0, 0x555) msgsnd(r0, &(0x7f0000000200)={0x0, "237a20fb876e7581b16ffa7f8aee50896c11909776d9fcff2a9d4e443d02cdfa91155d7435bff9658857920e1d3e7488d82eb9a156f93529fcb6ec9ff6cdd1319591830d451809e3c4116eb58b9dea4804e919d91b9ac33521b4ee1e64863841a00e269fb3c72da4cbd558a057bd10a879da85d68dd38bbefa3449949aa3706a6dfb8bfcb60378a724b17f0048acf89d7166d0398efb160fff66c24b5cbaf37946776414c8210b88fa0d46a934d9f1223e0ca6b852bf16aae2e4a0cba74c1bcda0da7f872e560b184f8e1d08a9e994e7eccd3faf5f"}, 0x3a3, 0x800) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) 06:37:44 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:44 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x8140, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000140)=""/32) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f00000000c0)=0x10) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x100000000000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:44 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='f`=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0000b3ab53fc86bb1378d8fd098a1fae48453469763c69be4876ac7680fb4824052e08baa79bfc76f6f5af8df17ab36ed1c59cfe9d7587abe3029da62cc9c0e9e9d05dfcdba2e3a004f8bcc72b2501b5838f7263f3b354d3b1aa7c86cf8058e35d4b28580ba9ea8e75df04b9c0ec97a3fd0c74acffd66f8e18edf0f9cd2df55b04f1ef69f006cce8967dd04d9df63753cf3b920ba14c7407cbafa9c717f780f80432690a3080ed0de7d7aae64836064a6ff59ad03a331d230e3642df6221ec0544c9bd724dcd359a61a8caf07a2404ca608a4df458c1b71f59"]) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) r2 = msgget$private(0x0, 0x42) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000240)=""/184) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x8000a0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:45 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) semget$private(0x0, 0x4, 0x2a) 06:37:45 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x40, 0x82) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x200b40, 0x0) fanotify_mark(r0, 0xd0, 0x40000021, r1, &(0x7f0000000100)='./file0\x00') ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000140)=0x7) 06:37:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x3a, 0x0) ioctl$KIOCSOUND(r2, 0x4b2f, 0x8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x8201, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r3, 0x800442d3, &(0x7f0000000280)={0x6, 0xd3, 0x5, @dev={[], 0x10}, 'bridge_slave_0\x00'}) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xf0ffff, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x0, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:45 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000000c0)={0x10001, 0xc, 0x4, 0x20001, {}, {0x5, 0x2, 0x3, 0x432, 0x8000000000000, 0x101, "51206e84"}, 0xffffffff, 0x3, @offset=0x100000001, 0x4}) unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x7, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:46 executing program 2: r0 = msgget$private(0x0, 0x604) msgrcv(r0, &(0x7f0000000080)={0x0, ""/106}, 0x62, 0x0, 0x0) 06:37:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x0, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:46 executing program 4: unshare(0x8020000) r0 = semget$private(0x0, 0x4, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x163400, 0x0) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) connect$inet6(r2, &(0x7f0000002740)={0xa, 0x0, 0x0, @mcast1}, 0x1c) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r2) r6 = getgid() fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r3, 0x6430) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000240)={{0x1000, r1, r6, r7, r8, 0x66, 0x7}, 0x0, 0x8, 0x5}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e20, 0xa8d3, @loopback, 0x7}}, 0x3, 0x6d, 0xf9d, 0x23, 0x4}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000440)=@assoc_id=r10, 0x4) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) perf_event_open(&(0x7f00000002c0)={0x7, 0x70, 0x2, 0x1f, 0xf62e, 0x6, 0x0, 0x1000, 0x40240, 0x1, 0xb3d, 0x0, 0x8, 0xfff, 0x401, 0x7fffffff, 0x1, 0x6, 0x8, 0xb7, 0x7, 0x8, 0xff, 0x80000001, 0x7ff, 0x20000000, 0x169, 0x9, 0xfffffffffffffff8, 0x3, 0x4, 0x1, 0x7, 0x0, 0x4, 0x8001, 0x1, 0xffffffff, 0x0, 0x0, 0x5, @perf_config_ext={0x4, 0x1f}, 0x20, 0x2, 0x8000000000, 0x5, 0x5, 0x3, 0x4}, 0xffffffffffffffff, 0x3, r5, 0x3) 06:37:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000002000), 0x1000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000003c0)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r3, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000340)={'vcan0\x00', r4}) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x2, 0xa, &(0x7f0000000480)=@raw=[@jmp={0x5, 0x10000, 0xd, 0xc, 0x0, 0xfffffffffffffff4, 0x4}, @generic={0x1ff, 0x9, 0x4, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7f}, @jmp={0x5, 0x400, 0x7, 0x3, 0x6, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x51}], &(0x7f0000000500)='GPL\x00', 0x9, 0xa, &(0x7f0000000540)=""/10, 0xf36ddd20178ff7ca, 0x1, [], r5, 0xd}, 0x48) r6 = syz_open_dev$usb(&(0x7f0000000580)='/dev/bus/usb/00#/00#\x00', 0x2, 0x200) ioctl$ASHMEM_GET_SIZE(r6, 0x7704, 0x0) 06:37:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x0, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xfeffffff, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:46 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x281, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xfffffffffffffe41) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000240)={0xa0, 0xfffffffffffffffe, 0x5, {{0x6, 0x2, 0xb9, 0x8, 0x4, 0x81, {0x6, 0x20, 0x1, 0x9, 0x7, 0x9, 0x83, 0xe552, 0x7, 0x6e, 0x9, r2, r3, 0xffffffff}}, {0x0, 0x1}}}, 0xa0) 06:37:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:47 executing program 2: socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in={0x2, 0x4e24}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1}, @in6={0xa, 0x4e22, 0x8, @local, 0xff}], 0x48) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x9, 0x4) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x45, 0x4, 0x20000000001) getsockopt$inet_mreq(r1, 0x0, 0x0, &(0x7f0000000100)={@broadcast, @loopback}, &(0x7f0000000140)=0x8) 06:37:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x1000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x103080, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f0000000240)) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:49 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x60, r2, 0x209, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xf59c}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x5}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5bd, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r3, 0x114, 0xa, &(0x7f0000000040)={0x1, "01"}, 0x2) unshare(0x8020400) 06:37:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x80, 0x0) write$selinux_attr(r2, &(0x7f0000000300)='system_u:object_r:devtty_t:s0\x00', 0x1e) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x17, &(0x7f0000000240), &(0x7f0000000280)=0x4) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) lstat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000680)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000500)=0xe8) mount$bpf(0x0, &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='bpf\x00', 0x18, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x16b}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x8}}], [{@euid_gt={'euid>', r4}}, {@seclabel='seclabel'}, {@fowner_gt={'fowner>', r6}}, {@measure='measure'}, {@context={'context', 0x3d, 'root'}}]}) write$FUSE_ATTR(r2, &(0x7f0000000540)={0x78, 0x0, 0x4, {0xffffffffffffffff, 0x1f, 0x0, {0x0, 0x3d5b20f0, 0xfffffffffffffffb, 0x7d21d383, 0xb65, 0x40, 0x4, 0x1, 0x0, 0x80, 0x6, r4, r5, 0x8001, 0x2}}}, 0x78) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='autogroup\x00') ioctl$KVM_NMI(r0, 0xae9a) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000480)={r1, 0x80000, r0}) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)="208e765daf44fcd51defbbd84c18289479fa0795209480397fceda3b01439f517d7a7a4777a003aa05217be689e7bbe4bcd3c882e3c598f1de9d05fc4e84a29ac24c3b59fa97bcb4aed4a250be31aa2a601a17f7a04d9259f478b92914e1", 0x5e}, {&(0x7f0000000180)="21db67cf840394dc2f971716ac54df44dce417a8031a39460d5524e03c8aa177b20681b0df61a0ace8ec503915ede12e8b6f1a104fbdf2ed56ad2d523023d443362e8cc5966853de2d086e76fa2ebd895ec55c7b002c4be2958f62c9e4d6271fbf3cd95a9646f3a7a84fe2db08a50debd20e0119982d59e4", 0x78}, {&(0x7f0000000200)="8b341d8296cf3d48137f048b647bb932b59b162d5f646d91e12c86f35fe4563e11bcdf8ca4c6d68cc367886b67a20e82a71bed964d05f47bcc134ae9bcc85f83318b66b7e378a5a56a47599b96f46422ebb86cc1b8f495fdcf4e9feb68b61e449b686ad097f2be5912092c69def189c2ecbfd9d1b0866fcd7080ea5e6525366cac6f6f5cf0ad27", 0x87}, {&(0x7f00000002c0)="05ccd49a264b2a78419a96e0fb069136eafd33585c1a62aa00ec106656ce8c36ec20691fe1bacaf38f615c1f3da3beda9fe5b890958d62ed9b0bf9fb8e6e672c4068b28555312964e94c4a22ae20813c", 0x50}, {&(0x7f0000000340)="1d14fb22fe45d579a450dcd6be79686f71e548df25437f4adc5ead866ea54497f2f84bf6a19d6d48e32e709fa8ff4ac5720fca0cacaf270c56bf7c1010a021ec59162e8ae551e934c1ab2429926cab1855b2b01881d826225a6fedd26d63381cd817", 0x62}, {&(0x7f0000000040)="0ba9954fb9ca5dc93e212ffedc2f8deb002a6d327fde00c1d3e3328a9d5980c658ba8467f121", 0x26}], 0x6, 0x8) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) 06:37:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:49 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) r3 = fcntl$dupfd(r1, 0x0, r0) unshare(0x8020400) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f0000000100)={0x20, {0xaa, 0x4, 0xfffffffffffffff7, 0x3, 0x9a28, 0x7}}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) bind$bt_rfcomm(r4, &(0x7f00000000c0)={0x1f, {0x7, 0x9, 0x7ff, 0x0, 0x1, 0x4}, 0x3}, 0xa) semop(r2, &(0x7f0000000000)=[{0x2, 0x3ff, 0x1800}, {0x1, 0x6, 0x800}, {0x2, 0x0, 0x1000}], 0x3) 06:37:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:49 executing program 4: unshare(0x801fffd) r0 = semget$private(0x0, 0x4, 0x0) mq_unlink(&(0x7f0000000100)=')*\\!\x00') r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x42000, 0x0) getsockopt$netlink(r1, 0x10e, 0x1, &(0x7f0000000040)=""/8, &(0x7f00000000c0)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x100000001, 0x1]) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) getsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x4) unshare(0x8020400) 06:37:50 executing program 4: unshare(0x20000000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2711, @reserved}, 0x10) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:50 executing program 2: msgrcv(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="000000000000000000000000000000000000004000000000000400000000000000000000000000f500000000000000000000000000000000000000000000000000000000000000000000000000000000006a0c541528bc28a72c84ae0757330000000000008ebd00000000000000000000000000932527cbbe6e1b2f3e6c8e52ad9778383b7a8e4dba5ae054be0d17fb2611f22fbcfa8534e06cae691298ac626d25897da585d01153f9342ba776"], 0x72, 0x0, 0x0) 06:37:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) r2 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x40000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000240)={{0x100000001, 0x1000}, 'port1\x00', 0x10, 0x80008, 0x1, 0x35f4, 0xfffffffffffffff8, 0xffffffffffff8000, 0x80000001, 0x0, 0x6, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x22200, 0x0) sendmsg$kcm(r2, &(0x7f0000000500)={&(0x7f0000000240)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'authenc(sm4,xts(twofish))\x00'}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000002c0)="2e9b25666e19434319a0f6d8647f8ecbd11b00dd129236d6959a655c4ef69f24cbffe352eaa2b8afa7e8c857f748d4a8bed3bfbb7eef5a9609177d0b35cda609c235b81bd20d1d67de082ed434ae1628c63b3c31fae3da7f4a9c131362da9825984d82d7c2f4e51a4721dc24ffb0af4879c711beb82125c4cf4d59b9ebccad0944668e0473", 0x85}, {&(0x7f0000000380)="413706f87f", 0x5}, {&(0x7f0000000480)="3bf8c026f17578fc2203a1fd490dd82da7d9c2aba13479dcf46c3c83c47453b9531929b4a5c7e07fcd462ce4a8b9d1d40fc5f4bf9783a1d088ca7da2e1a701cf5ade8127087f545a8368e60eaacdbfece009f751e95f00f18736aef846bcc815343e628be760f5e14562823bffe4dedb550c09543ea23c9893c2d7ca", 0x7c}, {&(0x7f0000000680)="69b70a8ad1ec2454b924ec06c917e1d20648edaadb1b8b9aa90c7e62a33633daba965a565fbccfd9d5b93254ce865a26f9b7bfbd5e12efb0959a04495f036a6af25bc2ff19983c75bd4abaed0827f504c953c56c0b2ea6c53fc5eb6423bc66e0e19bdba994ae55eaf2069ee14342413bbf093e792dc238d93f279b4725d76bd24cd85f4527bcf0d36ed61305f470f42d8400b8a25b93de0cf92ecf4bcd2a0cc1522c94ff3c747ceddf9250b7c1c3059b65a78670f1bd172099fe3df2f320cb57765e007939e810f9335e15bc703e2db7dbf3ca69ef36b19539ae6d7648173c4caaa6c30fd3d17969c8518b", 0xeb}], 0x4, &(0x7f0000000780)=[{0xf8, 0x100, 0xf615, "5143b32946ef2a40e24e9d655718f8da22185d075bcb955e47f519b3b770969c2f8eece7924e049397fbfe6ad04ff5a02f1698ad731e99a07eebb09a959f8c2c84ca21be0bf74fd354d803672bf76d8e47c0f2f9ef988d80296e33db7f8f5e41935188b5c1d6e553a37e9e647d5bd92b47b31a5c8aace07f2d9336660492dbcef6d88b17e9fa93c9faf71d1dcfe257a5a77cf37e759581917a1834da58b27604e73aa3861cf3c03cea9d3e6d5e569542e3ada8c2325aa0ae6bc2315a9735016f74b672734d142cb9452913e2dcf0e758f6ddbfcdd59cddec04eccec8163b6b650e3b"}, {0xc0, 0x118, 0x3f, "b73c4f6bc055f069f384696fb1084a555e348d0e8e9923a9ef0eaf279cb69fa96e4dd9c7fafc84fe56b51f007ad13f36e0e3757c03c05fd6b6aa168550746d0d3bd87daada5babd47258fce4815afe5b5786a49876d261c2a85cfc2c654ca67bdb020e6784ae009a60035927937a3fffbfb94459bc0edd62a7a2185216938795a37c640aab335abb09c38f2fbf0a380d89d93cce7ee6f516200637dfe9630f3cbdc42f9c7d32b210a1b950270de7"}, {0x98, 0x112, 0x80000000, "ab1354aa97a36c640d0f2fa75070b92c47184404ad2342fa659f1489a4ce35494319171c4c9dd3e2b3b6f7ae325753a6e60762ec22038c2e7ece489119adfb2314c1dda236ed4e715a7f3004faaaab7710853870a8dd86881c96cc1643958884a5e32df52ae8aeec4fd193358850767fa1e4b3d738a8ac40cde7c653fb5c562e59"}, {0xd0, 0x108, 0x4, "31773aca811305bb0109a7bba94ec5c216a7567b3668d0b5fac4c6ade24fc968666d56481b53ebeb8fecad29be54511aadf5efc4a0e5a7c5f8d258f79adc5db7c36aa9f706ea0d6bc94bf82b40abf2f793c6a9c09c5b8a2d2ada8803290852672b5a13b0c184228f84f9afc8ea49fabe3c3da960750e282a7413c620f82e61f8a3d6f6fe5181efdeefd439f6e500b595c5f17d35c45dabe57dc15f874e89ad80fc9e35854e62dd79801cae286bcabb3ecee1a8c5214d9e042431ce"}, {0x10, 0x1}], 0x330, 0x4004}, 0x80) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:50 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x40400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:51 executing program 2: msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000000000000000a8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x72, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x103000, 0x0) ioctl$VT_RELDISP(r0, 0x5605) 06:37:53 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x400, 0x0) ioctl$TCXONC(r0, 0x540a, 0xf1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001940)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001980)={{{@in=@rand_addr, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000001a80)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001ac0)={{{@in=@rand_addr=0x1f, @in=@multicast1, 0x4e20, 0x0, 0x4e21, 0x7, 0x2, 0x20, 0x0, 0xaf, r3, r4}, {0x0, 0x8, 0x0, 0x6, 0x9, 0x5, 0x400, 0x3fc}, {0x10000, 0x1a, 0xffffffffffffff7f, 0x5}, 0x3, 0x6e6bb1, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d4, 0x3c}, 0xa, @in=@remote, 0x3505, 0x7, 0x3, 0x10000, 0x4, 0x0, 0x5}}, 0x84) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c020a9dc07e8e7f1e677540e23a47d27cb71c90c074f04159aced09f16e57f81500433be39c655e56ac72a7e4137770f7e95c0a0efc84135bbe87efa4b9e83ea8ca8fd690d1bfffe7a77278fae49abf095c17e88262d038cf7810b6c048565ca9c511ea17af69e7a9261ba93b91bf196a2fde3e8e57607abd0004127f5faae4e472684b44e22d006c628065af85ca2a775f5290a38a28176b113b31823760c742df9cebb9eb7cc4d4371c9700f3c785a7011a4fcc749534066b51257b8ba21b", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f0000000680), 0xfe7) read$FUSE(r2, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x3}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486d84cfa5871e906ba91344ca3f251b72eacc6370757365746367726f"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000240)={0x2, 0x0, 0x2, 0x8}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000280)={r5, 0x1}) 06:37:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="6365706806", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:53 executing program 4: unshare(0x28000000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0xc37}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0x2, 0x4}, 0x8) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd}', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000018000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e00000000005022fb3bf1dd638b0f00619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c59ff70e344f346d73ec42b2c5722a2c244e149b5495b1b28b1a107def905dbbc30db6a0e7f"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:53 executing program 2: msgget(0x0, 0x80) r0 = msgget$private(0x0, 0x400) msgrcv(r0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) 06:37:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="9000000000000000000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc63273b17476d284cdc6f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x48, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x7, @mcast1, 0xc222}, @in6={0xa, 0x4e21, 0x3b, @mcast2, 0x1}, @in={0x2, 0x4e22, @loopback}]}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000380)=ANY=[@ANYRES32=r1, @ANYBLOB="c2060a00ffff0000a20900001f002c09bdc904001eb910812ae8d6189d9b383d4f4fd602000500"], 0x1c) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000030c0), 0x15f3) socket$inet_icmp_raw(0x2, 0x3, 0x1) read$FUSE(r2, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0xf10, 0x4041) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f0000000480)={0x4, 0x4, 0x1f, 'queue1\x00', 0x1}) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) r4 = semget(0x0, 0x7, 0xa0) semctl$GETVAL(r4, 0x1, 0xc, &(0x7f0000000540)=""/116) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x5) write$FUSE_DIRENT(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:53 executing program 4: unshare(0x8020000) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f00000000c0)=""/214) semget$private(0x0, 0x4, 0x0) r1 = socket(0xd, 0x5, 0x1) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000000)=0xffff, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:54 executing program 2: r0 = msgget$private(0x0, 0x40) msgrcv(r0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x1) 06:37:54 executing program 4: unshare(0x8020000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000001780)={0x0, 0xffff}, &(0x7f00000017c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000001800)={r0, 0xe47}, &(0x7f0000001840)=0x8) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) semget$private(0x0, 0x0, 0x104) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x200000d, 0x1010, r1, 0x0) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068f5", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x2, 0x1) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f00000002c0)={0x10000000}) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000240)='./file0/file0\x00', 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x332) 06:37:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:57 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) r1 = socket$inet6(0xa, 0x80005, 0x3ff) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x2e5f}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x6, 0x4, [0x11d6fcc0, 0x5, 0xd56, 0xa0]}, &(0x7f0000000100)=0x10) 06:37:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:57 executing program 2: msgrcv(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0000006863ab6d96faaa7a925d054d375eec000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x72, 0x0, 0x0) 06:37:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x0, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x0, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x0, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:37:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x0, 0x0, 0x3}) 06:37:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x0, 0x0, 0x3}) 06:37:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x0, 0x0, 0x3}) 06:37:57 executing program 4: unshare(0x8220000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x4007, 0x0) semop(r1, &(0x7f0000000000)=[{0x2, 0x9c8, 0x1800}, {0x0, 0x7, 0x1000}, {0x4, 0xbb6, 0x800}, {0x0, 0x2, 0x1800}, {0x2, 0x1, 0x800}, {0x4, 0x81, 0x1800}], 0x6) semget$private(0x0, 0x4, 0x1) semop(r1, &(0x7f0000000100)=[{0x1, 0x200, 0x800}, {0x2, 0xf88, 0x1800}, {0x3, 0x2, 0x800}, {0x3, 0xa, 0x800}, {0x2, 0x1, 0x800}, {0x2, 0x0, 0x1000}, {0x4, 0x8, 0x1800}], 0x2aaaaaaaaaaaab38) unshare(0x8020400) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3bd6, 0x24000) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x2d6164f9, 0x280000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r3, 0xa, 0x1}, 0x10) 06:37:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7f, 0x800) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000240)={0x1fd, 0x0, &(0x7f0000ffb000/0x2000)=nil}) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @multicast2}}}, &(0x7f0000000300)=0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={r4, 0x7}, 0x8) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:57 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x8000, 0x80400) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000180)=0x8001, 0x8) 06:37:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2}) 06:37:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2}) 06:37:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2}) 06:37:58 executing program 4: unshare(0x400) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000340)={0x18, 0x0, {0x3, @dev={[], 0x10}, 'lo\x00'}}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r3, r0, 0x0, 0x0, &(0x7f0000000040)='\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400204) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000280)=0x3f, 0x4) readahead(r1, 0x1, 0x2fe) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd}', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000018000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e00000000005022fb3bf1dd638b0f00619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c59ff70e344f346d73ec42b2c5722a2c244e149b5495b1b28b1a107def905dbbc30db6a0e7f"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:58 executing program 3: unshare(0x8020000) r0 = semget$private(0x0, 0x4, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x163400, 0x0) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) connect$inet6(r2, &(0x7f0000002740)={0xa, 0x0, 0x0, @mcast1}, 0x1c) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r2) r6 = getgid() fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r3, 0x6430) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000240)={{0x1000, r1, r6, r7, r8, 0x66, 0x7}, 0x0, 0x8, 0x5}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e20, 0xa8d3, @loopback, 0x7}}, 0x3, 0x6d, 0xf9d, 0x23, 0x4}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000440)=@assoc_id=r10, 0x4) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) perf_event_open(&(0x7f00000002c0)={0x7, 0x70, 0x2, 0x1f, 0xf62e, 0x6, 0x0, 0x1000, 0x40240, 0x1, 0xb3d, 0x0, 0x8, 0xfff, 0x401, 0x7fffffff, 0x1, 0x6, 0x8, 0xb7, 0x7, 0x8, 0xff, 0x80000001, 0x7ff, 0x20000000, 0x169, 0x9, 0xfffffffffffffff8, 0x3, 0x4, 0x1, 0x7, 0x0, 0x4, 0x8001, 0x1, 0xffffffff, 0x0, 0x0, 0x5, @perf_config_ext={0x4, 0x1f}, 0x20, 0x2, 0x8000000000, 0x5, 0x5, 0x3, 0x4}, 0xffffffffffffffff, 0x3, r5, 0x3) 06:37:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:37:58 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:37:58 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d0309148e145fe700471590000000000000000"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:01 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x800, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x88810, r1, 0x0) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e22, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) unshare(0x8020400) openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x10d000, 0x0) 06:38:01 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x401, 0x18000) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000200)={0xfffffffffffffe00, 0x200, 0x200}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x102, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8c3, 0x0, 0x9, 0x2, 0x3ff}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r2, 0x35}, &(0x7f0000000180)=0x8) 06:38:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_STREAMON(r2, 0x40045612, &(0x7f0000000240)=0x40) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7f, 0x800) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000240)={0x1fd, 0x0, &(0x7f0000ffb000/0x2000)=nil}) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1163.283955] Unknown ioctl 1074026002 06:38:01 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x3, 0x400000000) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000040)={0x8, "e2e3b896421f7b8a744d6e518d14f89ddefd058db79a2af692e29982db05992d", 0x2, 0x1}) 06:38:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:01 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2000, 0x8) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xd5, 0x109000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r2, 0xe, 0x1}, 0x10) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:38:01 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:38:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068fe", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1163.959163] Unknown ioctl 1074026002 06:38:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000280)='clear_refs\x00') read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000340)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSBRK(r3, 0x5409, 0x80000001) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000680)={"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"}) 06:38:02 executing program 3: unshare(0x8020000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000400)=0x8) semget$private(0x0, 0x4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="9000000000000000de836215485a85d3d79bb51baede9202000000ffff0000010000000000000000000000000100000066ce656d316e6f246576656d3100000200001a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b314806000000000000006367726f757024a3d030914ce145fe70047159480000000000000000"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:02 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000030c0)='/proc/self/net/pfkey\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000003100)={0x0, 0x1}, &(0x7f0000003140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000003180)={r1, 0xaf6}, 0x8) 06:38:02 executing program 4: unshare(0x40000003) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x21) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000240)={"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"}) semop(0x0, &(0x7f0000000080), 0x0) unshare(0x8020400) 06:38:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="6365706802", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:02 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x2c0002, 0x20) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000040)={0x400, 0x52b2199a, 0x2, 0x3, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f00000000c0)) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:38:02 executing program 3 (fault-call:6 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1164.405456] FAULT_INJECTION: forcing a failure. [ 1164.405456] name failslab, interval 1, probability 0, space 0, times 0 [ 1164.420739] CPU: 1 PID: 25253 Comm: syz-executor3 Not tainted 4.19.0+ #313 [ 1164.427784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1164.437142] Call Trace: [ 1164.439765] dump_stack+0x244/0x39d [ 1164.439791] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1164.439815] ? __lock_acquire+0x62f/0x4c20 [ 1164.439835] ? print_usage_bug+0xc0/0xc0 [ 1164.439855] ? rcu_softirq_qs+0x20/0x20 [ 1164.448671] should_fail.cold.4+0xa/0x17 [ 1164.448701] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1164.448720] ? mark_held_locks+0x130/0x130 [ 1164.448750] ? __lock_acquire+0x62f/0x4c20 [ 1164.448765] ? zap_class+0x640/0x640 [ 1164.448789] ? find_held_lock+0x36/0x1c0 [ 1164.482432] ? zap_class+0x640/0x640 [ 1164.482457] ? perf_trace_sched_process_exec+0x860/0x860 [ 1164.482474] ? _kstrtoull+0x188/0x250 [ 1164.482493] ? zap_class+0x640/0x640 [ 1164.482519] __should_failslab+0x124/0x180 [ 1164.490286] should_failslab+0x9/0x14 [ 1164.490305] kmem_cache_alloc+0x2be/0x730 [ 1164.490327] ? find_held_lock+0x36/0x1c0 [ 1164.490403] locks_alloc_lock+0x8e/0x270 [ 1164.490426] ? locks_check_ctx_file_list+0x120/0x120 [ 1164.499655] ? __fget+0x4aa/0x740 [ 1164.499674] ? lock_downgrade+0x900/0x900 [ 1164.499698] ? check_preemption_disabled+0x48/0x280 [ 1164.499727] fcntl_setlk+0xc8/0xfb0 [ 1164.499749] ? fcntl_getlk+0x520/0x520 [ 1164.499767] ? lock_downgrade+0x900/0x900 [ 1164.499787] ? lock_release+0xa00/0xa00 [ 1164.499805] ? perf_trace_sched_process_exec+0x860/0x860 [ 1164.562507] ? ksys_dup3+0x680/0x680 [ 1164.566238] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1164.571775] ? _copy_from_user+0xdf/0x150 [ 1164.575944] do_fcntl+0xa6f/0x1500 [ 1164.579507] ? f_getown+0xc0/0xc0 [ 1164.582986] ? __fget_light+0x2e9/0x430 [ 1164.586962] ? fget_raw+0x20/0x20 [ 1164.590406] ? __sb_end_write+0xd9/0x110 [ 1164.594466] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1164.600002] ? fput+0x130/0x1a0 [ 1164.603289] ? do_syscall_64+0x9a/0x820 [ 1164.607255] ? do_syscall_64+0x9a/0x820 [ 1164.611224] ? trace_hardirqs_on+0xbd/0x310 [ 1164.615542] ? __ia32_sys_read+0xb0/0xb0 [ 1164.619610] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1164.624967] ? security_file_fcntl+0x94/0xc0 [ 1164.629369] __x64_sys_fcntl+0x177/0x1f0 [ 1164.633439] do_syscall_64+0x1b9/0x820 [ 1164.637329] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1164.642704] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1164.647632] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1164.652480] ? trace_hardirqs_on_caller+0x310/0x310 [ 1164.657505] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1164.662512] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1164.667533] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1164.672384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1164.677562] RIP: 0033:0x457569 [ 1164.680744] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:38:02 executing program 3 (fault-call:6 fault-nth:1): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) [ 1164.699654] RSP: 002b:00007f1630470c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 1164.707377] RAX: ffffffffffffffda RBX: 00007f1630470c90 RCX: 0000000000457569 [ 1164.714637] RDX: 0000000020000140 RSI: 0000000000000007 RDI: 0000000000000005 [ 1164.721893] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1164.729157] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16304716d4 [ 1164.736433] R13: 00000000004bdcf5 R14: 00000000004ccc80 R15: 0000000000000006 [ 1164.781003] FAULT_INJECTION: forcing a failure. [ 1164.781003] name failslab, interval 1, probability 0, space 0, times 0 [ 1164.792486] CPU: 1 PID: 25266 Comm: syz-executor3 Not tainted 4.19.0+ #313 [ 1164.799499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1164.808840] Call Trace: [ 1164.811417] dump_stack+0x244/0x39d [ 1164.815049] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1164.820244] should_fail.cold.4+0xa/0x17 [ 1164.824314] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1164.829470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1164.835015] ? check_preemption_disabled+0x48/0x280 [ 1164.840031] ? find_held_lock+0x36/0x1c0 [ 1164.844116] ? perf_trace_sched_process_exec+0x860/0x860 [ 1164.849577] ? locks_init_lock+0x250/0x250 [ 1164.853803] ? is_bpf_text_address+0xac/0x170 [ 1164.858292] __should_failslab+0x124/0x180 [ 1164.862532] should_failslab+0x9/0x14 [ 1164.866339] kmem_cache_alloc+0x2be/0x730 [ 1164.870489] ? zap_class+0x640/0x640 [ 1164.874217] ? rcu_softirq_qs+0x20/0x20 [ 1164.878206] ? rcu_softirq_qs+0x20/0x20 [ 1164.882186] ? unwind_dump+0x190/0x190 [ 1164.886124] locks_alloc_lock+0x8e/0x270 [ 1164.890198] ? locks_check_ctx_file_list+0x120/0x120 [ 1164.895295] ? find_held_lock+0x36/0x1c0 [ 1164.899353] posix_lock_inode+0x62b/0x26c0 [ 1164.903605] ? check_preemption_disabled+0x48/0x280 [ 1164.908630] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1164.913572] ? kasan_check_read+0x11/0x20 [ 1164.917740] ? __break_lease+0x1760/0x1760 [ 1164.921999] ? aa_file_perm+0x490/0x1060 [ 1164.926081] ? aa_path_link+0x5e0/0x5e0 [ 1164.930085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1164.930103] ? check_preemption_disabled+0x48/0x280 [ 1164.930130] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1164.930150] ? __lockdep_init_map+0x105/0x590 [ 1164.950745] ? __lockdep_init_map+0x105/0x590 [ 1164.955260] ? lockdep_init_map+0x9/0x10 [ 1164.959328] ? __init_waitqueue_head+0x9e/0x150 [ 1164.964003] vfs_lock_file+0xc3/0xe0 [ 1164.967741] do_lock_file_wait.part.30+0xd0/0x260 [ 1164.972592] ? locks_remove_posix+0x840/0x840 [ 1164.977085] ? apparmor_file_lock+0x43/0x50 [ 1164.981422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1164.986971] fcntl_setlk+0x310/0xfb0 [ 1164.990709] ? fcntl_getlk+0x520/0x520 [ 1164.994596] ? lock_downgrade+0x900/0x900 [ 1164.999281] ? lock_release+0xa00/0xa00 [ 1165.003271] ? perf_trace_sched_process_exec+0x860/0x860 [ 1165.008724] ? ksys_dup3+0x680/0x680 [ 1165.012450] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1165.017975] ? _copy_from_user+0xdf/0x150 [ 1165.022125] do_fcntl+0xa6f/0x1500 [ 1165.025691] ? f_getown+0xc0/0xc0 [ 1165.029163] ? __fget_light+0x2e9/0x430 [ 1165.033138] ? fget_raw+0x20/0x20 [ 1165.036595] ? __sb_end_write+0xd9/0x110 [ 1165.040665] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1165.046202] ? fput+0x130/0x1a0 [ 1165.050276] ? do_syscall_64+0x9a/0x820 [ 1165.054248] ? do_syscall_64+0x9a/0x820 [ 1165.058228] ? trace_hardirqs_on+0xbd/0x310 [ 1165.062573] ? __ia32_sys_read+0xb0/0xb0 [ 1165.066652] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1165.072012] ? security_file_fcntl+0x94/0xc0 [ 1165.076413] __x64_sys_fcntl+0x177/0x1f0 [ 1165.080480] do_syscall_64+0x1b9/0x820 [ 1165.084374] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1165.089741] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1165.094658] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1165.099506] ? trace_hardirqs_on_caller+0x310/0x310 [ 1165.104530] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1165.109548] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1165.114571] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1165.119410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1165.124588] RIP: 0033:0x457569 [ 1165.127820] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1165.146875] RSP: 002b:00007f1630470c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 1165.154570] RAX: ffffffffffffffda RBX: 00007f1630470c90 RCX: 0000000000457569 [ 1165.161830] RDX: 0000000020000140 RSI: 0000000000000007 RDI: 0000000000000005 [ 1165.169098] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 06:38:03 executing program 3 (fault-call:6 fault-nth:2): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) [ 1165.176373] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16304716d4 [ 1165.183642] R13: 00000000004bdcf5 R14: 00000000004ccc80 R15: 0000000000000006 [ 1165.221444] FAULT_INJECTION: forcing a failure. [ 1165.221444] name failslab, interval 1, probability 0, space 0, times 0 [ 1165.233055] CPU: 1 PID: 25274 Comm: syz-executor3 Not tainted 4.19.0+ #313 [ 1165.240087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1165.249444] Call Trace: [ 1165.252022] dump_stack+0x244/0x39d [ 1165.255639] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1165.260823] ? __kernel_text_address+0xd/0x40 [ 1165.265309] ? unwind_get_return_address+0x61/0xa0 [ 1165.270232] should_fail.cold.4+0xa/0x17 [ 1165.274308] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1165.279431] ? save_stack+0xa9/0xd0 [ 1165.279452] ? kasan_kmalloc+0xc7/0xe0 [ 1165.279472] ? kasan_slab_alloc+0x12/0x20 [ 1165.287223] ? kmem_cache_alloc+0x12e/0x730 [ 1165.287241] ? locks_alloc_lock+0x8e/0x270 [ 1165.287255] ? posix_lock_inode+0x62b/0x26c0 [ 1165.287268] ? vfs_lock_file+0xc3/0xe0 [ 1165.287282] ? do_lock_file_wait.part.30+0xd0/0x260 [ 1165.287298] ? do_fcntl+0xa6f/0x1500 [ 1165.287311] ? __x64_sys_fcntl+0x177/0x1f0 [ 1165.287331] ? do_syscall_64+0x1b9/0x820 [ 1165.295785] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1165.295808] ? check_preemption_disabled+0x48/0x280 [ 1165.295837] ? find_held_lock+0x36/0x1c0 [ 1165.295914] ? intel_hdcp_auth+0x1898/0x3d70 [ 1165.344048] ? perf_trace_sched_process_exec+0x860/0x860 [ 1165.349498] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1165.355049] __should_failslab+0x124/0x180 [ 1165.359304] should_failslab+0x9/0x14 [ 1165.363110] kmem_cache_alloc+0x2be/0x730 [ 1165.367254] ? rcu_softirq_qs+0x20/0x20 [ 1165.371219] ? rcu_softirq_qs+0x20/0x20 [ 1165.375201] ? unwind_dump+0x190/0x190 [ 1165.379092] locks_alloc_lock+0x8e/0x270 [ 1165.383142] ? locks_check_ctx_file_list+0x120/0x120 [ 1165.388239] ? find_held_lock+0x36/0x1c0 [ 1165.392301] posix_lock_inode+0x637/0x26c0 [ 1165.396534] ? check_preemption_disabled+0x48/0x280 [ 1165.401566] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1165.406496] ? kasan_check_read+0x11/0x20 [ 1165.410652] ? __break_lease+0x1760/0x1760 [ 1165.414882] ? aa_file_perm+0x490/0x1060 [ 1165.418935] ? aa_path_link+0x5e0/0x5e0 [ 1165.422910] ? intel_hdcp_auth+0x1898/0x3d70 [ 1165.427336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1165.432862] ? check_preemption_disabled+0x48/0x280 [ 1165.437872] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1165.443400] ? __lockdep_init_map+0x105/0x590 [ 1165.447885] ? __lockdep_init_map+0x105/0x590 [ 1165.452371] ? lockdep_init_map+0x9/0x10 [ 1165.456438] ? __init_waitqueue_head+0x9e/0x150 [ 1165.461119] vfs_lock_file+0xc3/0xe0 [ 1165.464836] do_lock_file_wait.part.30+0xd0/0x260 [ 1165.469672] ? locks_remove_posix+0x840/0x840 [ 1165.474164] ? apparmor_file_lock+0x43/0x50 [ 1165.478489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1165.484019] fcntl_setlk+0x310/0xfb0 [ 1165.487734] ? fcntl_getlk+0x520/0x520 [ 1165.491612] ? lock_downgrade+0x900/0x900 [ 1165.495753] ? lock_release+0xa00/0xa00 [ 1165.499714] ? perf_trace_sched_process_exec+0x860/0x860 [ 1165.505181] ? ksys_dup3+0x680/0x680 [ 1165.508905] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1165.514434] ? _copy_from_user+0xdf/0x150 [ 1165.518574] do_fcntl+0xa6f/0x1500 [ 1165.522110] ? f_getown+0xc0/0xc0 [ 1165.525569] ? __fget_light+0x2e9/0x430 [ 1165.529547] ? fget_raw+0x20/0x20 [ 1165.533018] ? __sb_end_write+0xd9/0x110 [ 1165.537078] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1165.542603] ? fput+0x130/0x1a0 [ 1165.545872] ? do_syscall_64+0x9a/0x820 [ 1165.549846] ? do_syscall_64+0x9a/0x820 [ 1165.553814] ? trace_hardirqs_on+0xbd/0x310 [ 1165.558136] ? __ia32_sys_read+0xb0/0xb0 [ 1165.562211] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1165.567581] ? security_file_fcntl+0x94/0xc0 [ 1165.571990] __x64_sys_fcntl+0x177/0x1f0 [ 1165.576041] do_syscall_64+0x1b9/0x820 [ 1165.579916] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1165.585301] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1165.590235] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1165.595083] ? trace_hardirqs_on_caller+0x310/0x310 [ 1165.600092] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1165.605099] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1165.610106] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1165.614943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1165.620120] RIP: 0033:0x457569 [ 1165.623317] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1165.642209] RSP: 002b:00007f1630470c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 1165.649917] RAX: ffffffffffffffda RBX: 00007f1630470c90 RCX: 0000000000457569 [ 1165.657191] RDX: 0000000020000140 RSI: 0000000000000007 RDI: 0000000000000005 [ 1165.664464] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1165.671732] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16304716d4 [ 1165.679013] R13: 00000000004bdcf5 R14: 00000000004ccc80 R15: 0000000000000006 06:38:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000280)='./file0/file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="010000007f5d1b8f2c501be975"], &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f00000004c0)=""/216) 06:38:05 executing program 4: unshare(0x8020000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x6000, 0x0) epoll_pwait(r0, &(0x7f0000000240)=[{}, {}], 0x2, 0x9, &(0x7f0000000280)={0x8}, 0x8) r1 = semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000, 0x4000) openat$cgroup_type(r3, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) semop(r1, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r4, 0x4) r5 = shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_STAT(r5, 0xd, &(0x7f0000000180)=""/65) unshare(0x8020400) 06:38:05 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x20, 0x40) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000340)=[@in={0x2, 0x4e21, @rand_addr=0x5}, @in6={0xa, 0x4e23, 0xff, @ipv4={[], [], @rand_addr=0x20}, 0x3ff}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}, @in6={0xa, 0x4e20, 0xfffffffffffeffff, @remote, 0xa3}], 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) getresgid(&(0x7f0000000840), &(0x7f0000000880)=0x0, &(0x7f00000008c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@mcast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000a00)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r2}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/autofs\x00', 0x80000, 0x0) ioctl$KDGKBDIACR(r4, 0x4b4a, &(0x7f0000000480)=""/169) accept4$inet6(r0, &(0x7f0000000640), &(0x7f0000000280)=0x1c, 0x80800) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="faf1be23458957b9e56cac9adeeb3da2506a876037a7b9301f95"], &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000010000000000000000000000000100000066ce656d316e77b525b04da734b30086616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x20000000400200) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000680)={@in={{0x2, 0x4e24, @loopback}}, 0x7, 0xffffffffffffff81, 0x2, "d03a3984c4bc52c7832c9a3ff8703e73cf9999f794e47da68169c5bbdf000cc878642c2abfc1c7940bcc228b810f92142c1ab2270993e50505e883821b080a018c7aa2b3cec9ca49a87c193c5aeaf9f5"}, 0xd8) ioctl$TIOCGETD(r4, 0x5424, &(0x7f0000000240)) setsockopt$inet6_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000040), 0x4) 06:38:05 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000100)={&(0x7f0000000040), 0x0, 0xffff, 0x4, 0x9, 0xfff, 0x7f, {0x6, 0x400, 0x9, 0x2, 0x5, 0x2000000000, 0x9, 0x5, 0x1, 0x5, 0xea, 0x5, 0x7, 0x8, "d0b336f8168db9b7e160f135a5b92060b6617246e9f09f8901e8925aefc0d18e"}}) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0xfffffedf, 0x0, 0x0) r1 = msgget$private(0x0, 0x20) msgrcv(r1, &(0x7f0000000180)={0x0, ""/4096}, 0x1008, 0x3, 0x3800) 06:38:05 executing program 3 (fault-call:6 fault-nth:3): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068f0", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x11, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:05 executing program 4: unshare(0x2000000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f00000000c0)) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) setresuid(r1, r2, r4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000340)={0x2, [0x0, 0x0]}, &(0x7f0000000380)=0xc) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000003c0)={r5, 0x5, 0x69}, 0x8) uselib(&(0x7f0000000540)='./file0\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x103400, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r3}) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) unshare(0x8020400) r8 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x400000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r8, 0xc0505405, &(0x7f00000004c0)={{0x1, 0x2, 0x8, 0x0, 0x8}, 0x7, 0xfffffffffffff000, 0x2}) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$SIOCSIFMTU(r9, 0x8922, &(0x7f0000000440)={'ipddp0\x00', 0x6}) 06:38:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x402, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x10, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200000, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r3, &(0x7f00000040c0), 0x1323) read$FUSE(r3, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r3, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r3, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) write$binfmt_aout(r1, &(0x7f0000000680)={{0x0, 0x2, 0x5, 0xa2, 0x199, 0x1000, 0x1, 0x1}, "5bb7a70249de5377393f719795e2b45bb96c27180f4ab880ffe05be88444e1e0c213af4ffc3c46d26c38bdfd4b168b473e40d8e45af7c00c763a423528d3633385f964d6ea3993cac5ab0d0d690a18ecde0d99e83d0cd2992527b62ca7673551a16f3184ad7ae25c91442ad47756841032a451cf0f48714e99f8dffaae26e6a9dcd1f20fb84b94dd3c0574627eefc8d3a8a258ad61e966e3b10a3cb8158de7e6bf94fa7aab77b2a783e0d14d4954c7ba9016e35ae3f7cb0cd3ef4ae45878b27e77d06ef4a6d900feb2a400bea941b83fb5218aabe7dd61f067329f9f94498ec5d710bfc98aaf59f1b204badb59dacc8daaa554bb5b2585206e0864448eeb70593e167189174c4648312439cb28595618173bf567f996dfd5805a932d14544611f850d93c7a7f9710d83a4c7fcf3b399ff4b32fc8d2595d11ad10b848c65fab684a88fd73d4f168e53735d9fb7fb6a949b8244375434adfb66510c3f409f43b54058ed18694a3224b02a848672d32701adf0f0d31ad5dfee03a090b37a792b4e4cd90e9d7a7cf4b7b079c4fa18c7519104897100b57ba8dc104e308bf7ed0a531c01cdeb2b2959a85cb31e9b78c3de64fb0675c15246d10bc41a64631cf8f1500eb1049e42abe7b9a84219e1fed4164a600669cee52c2692c4ece8d75db38ff0b63e81703d498800e4c295de5a60cab519bf6531ff2a64f1fd140d824cad4ac021993c829dcfaf98b8180ea42976e146c179d61bb0c17d228ff39648f86272dd4c95e4c1b48d123cac1971d77f0811c1a863cf2eec266f4a89d81aaf32a16ff00f4139fd88ee60a880dbefb4b872698fc54a46f9670f721d92ae1d2f27f5736050060278d5397c218f6d6a859d7be4ff5c02da6e0d04d23222c5e91ccac0f12332d8f5f096ef3306b18f706564d33d9f324a67443ce67dbc1b649d27775efa99e09ad6dfa44ea85536c12f172ca96bc843e5a041cbe842ec0ad815d911ec18e88bfe1eb0a8f06caa1006c7abe8753a048a53ce0582d9c0c1592631c4d46d3eb4177f376553ae79fa531c3300c64a40ba7adbb9579ed3a7b311888e173728ef36ae69571ff96a54ed200a28e2179918e3d18fdedab20a806cd7acc6442ba4aec8b3c859208950c1584cc00f80ed03e67e2f5530a33f8a9c18bfc6137b2c07f46f42b46057c9d1c57a7ac585c03cef7a3a9a649cefbfe1407799071038937f880d612c62d86e2b64052fe63adfa4bd66f4d41f6c82124336c42728a04bcad1dcf47459a692060675dfc5c78de6008e5ae07e65d573262cc05de7bd140ccb6f89b247b22194934374c13f68f45512e1f3862c34d23b14523a1ea643006fa6606eac2120fe199bfe1d03169f5e88bc38fdb6e98cc1399688ee604aa0ba322503b386dd98f148727791814b1e205a8c35fe333d987fece0fc8a8a3893983afdc0ad6ccc48c6d480e88c04663023f6db058dda3d242aa956da6628f7847d35db08f927a4d62e1186a9b428aee19ec52841ff0edf2d974e4cafe3864525a75d446d049caca0d57decb79b80db45a46debf6bd0e2ea7f65f823ed3b28e8857d26d87af9bd3c6e72abf5f79f89f97ab39af84b64977374813a9eb4df408c62f2332178ab39ac8d1211f247fd2eda9001f43eca38568337882b865510fb7e076c097708e6a31a8535e6186d54129d761dc7f34ef5f0c8eab88941561076f4c981c5a9642438c2ebda7648083c98c10c8adeb8b5fbabefb8f0b1e6e304fc90fac2959bd6c209fdf7d5828c98f9fffcb162f1552a2f5d134ed3e2ee033ace5e83597b976cfeede1468243b9941c14b57aab4d45998f1427c9a92ccc3d486ec8c1935e2f3fe19c85be4d3a9b374862fcf3055bb050d838b72dbb0fb576b0d5ee0a6732266f6167e1682faecb69a46a288367da785278f7866086441947aad09695cdb86cb2d6b7775b7efc9e71c03bca76a6f6b866b712ba2a1a9253fbc51a555ebd6ee5e4d7a11c067c1746b339ac408570c371885aa18cb7c00abab4d2fa8f1242c17384be639c88b42647ddfcbd53da0b3b001bb18dede98034fa20e6e583a00055c0732507b6f6719b4081a90ed9a2c3cc9b19b2652f8a0cfea9b44bae22c6c937fc88fc414658d9501944e061756e5bcb7b4adea9675529384f927774d13c7e18eaf04eaa7f2d97081a3b16315da3d5889acfcec23a04f8c8675b7f8045bc751254305ba2240862690e9c6fb164b14c57ed0bae79699957b5c8823cf36ea0165596e9beb1c7cbb5e389cd8b61b7f3b22a920aa33aefdf373e77730d2da4ac3243e54e1e3c83f4a895ccda8e0ed2d6037e114956a8fa22f0eba3000139829ed457854be005759c43842e9586b33342b1428dd5d2c97b91ea46157f188b06b659b793bb5325aee4958c8473c28655d6f0012d4466a9e30281d8148306e442d001e3b5fad8eefb5f95762c9aa9e060373bf8a0240a997b38300f4f1fc13671ccd5e54547525ef2419bff45a7e3253e23ba070234df8079ce8460a52a3f5e68e277d3d361edf92f9d3b42a5a3a514ebee047267e0e1169537b6d85e2ab10bfbdf687eecbf0890ad147b40d0a3f3408ccf9b2dc74fdc4b5a15ba494c1298ffac2646e82eb014ab703e1be44ec28139a4d0926b7fc646d1ff9aaea3e6c49be9e5116e499790f785817223f0d29388c3a850f978dc746346062d2175d2154856cf663532bdf3e6dc66475d8c23eb62fd2d88f985a85d83983230acf8fbde6a74bd9a74d7b1ee3db332aa3fb6b0bae9410f6d91d1090cb2da863528afd42f43591c228f5cb404fbde0461ff1f49d5bfd15be9c7ba496d0c931916f2e872f1b4ff3f1ea520dd78c6279ff84f76c388cb02bbe28f466d9fe8df15b34c56b318a2733880e52e8bc1987c082ef5cb3da2e79338731d78ef84eedae2b0d136628c8929b4eb43c4e58de7970d06d2f75a07398badbeab04979e24381bb91325f51b511507550797b6c49122a33465d48d2c730e6d08f2c1320c597c019a776a76c536527623e97d5ccd70c5ff96a2c8dffdf6f98cba99091966533289793a8a4b5213cd801d624ea83816884e6896301141c7ad071cbe233d6b6c4f75bdfc260e60ded19e43dd906e660f4a63e71435c68640226870c506e155292d9369e8b72abee88eed41b17620284936ce2ecaf589623d162f1fa1a1a60bacf501f54ca31f4a0e426f2f404c052a72822f5c9a207ef8a4e841f06032f5af4241b88a3e65f6dc14d2b814992301c1c596c3ab40d0c9769ef74928821272f26a7b7f8a060a4f448729643a56d372c873ea3a7826fdd10b6de960efe3e4e9f02663d03d1622171c3eaa5882a3f04ce9fd1779b6b858ccd8419038c15c09cc95440bf128940bfecc8adcf0e5dbc5231f0589193ddc1c0e1cd922417a95515d3de405fdb56f01f39008f1d9f53985c822f7004605b90b2d3e93a09d1b4b299e8583719d08b1e242aa4073d34e04edd35217dd8e90a24ae8909a83a130ae5d56b4380ee5118bfaf9616f2533d7ba5c97d9daaa9fb65abb4ab28190dee7b98eea846e4f63efa39c0bd2b90d7d64525f948de7133d5e82708e82483cca68b4e8aa89c2a5b2db5595ffe96d6283b5c81221336374ebf840ef1fe01d233f49e6a22fb49b4bcbec5b14ff0ccfbb1ad88536166ed16fdd7ea950df0e15e2132bf5a0417f5b8c002d6198ee850aac070510c05daf18c65b20b4d9abe21ef98ce7c9119034c813cbc60c6c706f4b7a111df0e8cb64114d39e7f4d2aee560c34f0e5dca4a11fae839ea733ea997458e0d853f7bde44d5f20bcfadca092c1cb6af84fad024ed5a12b95a2aae267f549af5a4b201ee2fa827a503dd3f0fb6b9ae7bc60f36fa2dcf187705fb18101fe310a68bad0a2bc67937a587da6bf8ef5bfce0cde1d4c2ea0b6423da40a60d5e8002ad403562c6010cbcb7fa20b5ddd27fc02a3b8790cb00dd5cd1398490d06d53e680a7f8234eb9d4268dc6111b1b3f0bd6d248bca9674b60f6ded4af6aad086e0a65f1bf06cb78ea6a7a96e2e5763d23fedbbb792c41c364d2652921c99bee5084125378fbcbb3018be99a4ddf90926e4b9d683805709ff0d0509a85aab5bfb5d70d250acbd255ca8cbe0b96d5e20f6694a3932f62db36e090d73ff14316350fc4fea6e1cf93bdfc34605fe7454a1681a57ef16a286b05a8a52f21f2c4e647d77438537546ba2105d4c872b2f78768108c5b52ae7f96323a994f3a0edb0c9a92a994578b335600b6e85654220a35ea41248b3cdc0b480fcc76ed1589cdfc00e134f21953a9f6b9eb5269dde56ee5a0fe1d1df86ad3e84a73a9c569dd62601e45530f2e295be3e2dd6bed73846d216af1f5172e044fd786c8b93819c10b7d8b653fad8da5548341f5ffac3990fa1d2f984cf11f7faa8b39c84e5a1e32edb82f4aa0632d1a0db929d7a131e79ab04be32a1aedc73c22848d59b3673e304cc9fef5f101667a5a39d314dcc99089a58ad3e3f520f3c83a7f6ea096781a1f96e2b2cb816d28ca46d1ada5bd0f8190d0512b1822eff347224fee4afc62c1f7d6ca55c389ab8eb2c7d883cb04c5e3fb9da70540635c0264067b8334d09ad5de2366d2e221a94c3b79e3a8807480430cbdc16c5de2b7f122d64551e9efd2ca93cca17a784faacab7ba501d01d8469adf92fa18b690b9edea779751cca4ac938c0cee393bf4c2d0fa5802907218aca2a8ec1919cdc11a1f652388b2fb5571e88c948d047b9880c5392f1651be6e411284b9fbd987460d8e61683e8ea619d9ede09e589d31468c268245ac97f67f487ad310bf37f074dcebbee50e9785a8dbb6786b1e9fcaaac2e6ea8adc58b3e67a78594c8cd5d4c839bd0fe2a599c9f3b178fb37adf8dd49e6e0fa93b36ad81a2d5aff96d306b1a63ce6550c0a357f0ae7304a2bbea1b02a7667ee12d650793397afa1886838a061f2e3942267c9541c9e4a8db15d5cdc4e8967cd375c450ff3db30abc133cd6785b4d9af17afc43857b4718623f2d1305c8999c1b59441864a4eba0fdde32320f74114f323bff8c231f9385ec6d9d18defe32f33a4999c2594175f8b1374fec69647704f908b3d2ac253bb7eb486acc36119a552bc233f9a51aa94f2c17fcf2906d45dd0813fe2c7ab83cadf80badc0d7a60603857222ae00ff6be5cc53f56bb4f3ff6fa6a901f41bce925dd342f058bffa30546a1c8ec02721c5f2399d50f95e2d9c735c111a511ebff3c84d6d7f2158255df1292239b99762d417318664644cf69658b86cd7bb933396047b7c51ea614d456f40f35e2d6b0f281e1960fe8bc9df1b28a729f2f03e071c7fc6a865e2aa2c76c3ecdf57ba51dad28f017844151fc4252a14ca5fcdc870dfbc78e73fe4ed4ae7f2080c4558247d84442d84f0af41f4fd0bb10a4de3ee80b4690da32a7adcb86f3dccba78bfc8714f5d606cb1a34e9f14836af27ce6cbf6af582f2e5571f6fe282e933380bb2ab055f783f20e48f7a533c7c970d0c2f6d1c3d60943cf71ed3d18c17219e41ba0e45635cd999716dc7674ad8cfa8eece8ca382cb4bff7a4a7d1f394ffdfb0238ee5f9112f64dfcc6a51e0929cf54c442745ba9f4b19e51a715a813f64b12cf1353fe84f67faf5f382211b6475121c9b472640de0cbb6978cd1f6ebaa371ec3fb01ad0c7107efb69282ff923c03a6bb8bb2676aedff35d9937e83dc3d66cb53157e59cb13893f5b266460d74ee467bf6f5796a8609e10628a37dd3de655b77e1709e20d919a9424a58abb048b2bb6445f6978236f007aff356a873ee292601d11d5", [[], [], [], [], []]}, 0x1520) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x24, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:06 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) unshare(0x8020400) 06:38:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:06 executing program 2: r0 = msgget(0x3, 0x608) msgrcv(r0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) 06:38:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0xf, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000240)=""/135, 0x87) 06:38:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x409, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x5, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x9, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x40b, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x40a, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f0000000280)=0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x6a, 0x80000001, 0xc46, 0x97, 0x3, 0x2, 0x3e, 0x6370, 0x207, 0x40, 0x2b7, 0x1f, 0x8000, 0x38, 0x2, 0x6, 0x3, 0x6}, [{0x0, 0xfffffffffffffffe, 0xfffffffffffffff9, 0x6, 0x7fffffff, 0x3ff, 0x8, 0x9000000000000}, {0x7, 0x3f, 0x6, 0x9, 0x0, 0x7, 0x9, 0x2}], "1f5037d75d3e031f2c52d9e1c05b7fdca557d31a4fb99c2fa162bc198a12dfc38051f9bbfb16284673b2f2e55d2c8accddb164d62fb9f0906047d0004f95bf4ff7157a88f50b7368735aa818a91882881720a6696d3349828f3c593978d092b4129d0ae77fce6ac7"}, 0x118) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0c67726f63705f699974", @ANYRESDEC=0x0, @ANYBLOB="0000bff2a6b8e33eaad373e4f54f25b9"]) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) r2 = socket(0xa, 0x6, 0x1000) connect$bt_l2cap(r2, &(0x7f0000001a80)={0x1f, 0x7, {0x1f, 0x6, 0x1, 0x9, 0x4}, 0x6, 0xffffffffffff8dc1}, 0xe) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pwrite64(r1, &(0x7f0000000240)="6db0848cc76450752b4933b765eaea269b7a7a18a8bf3f49554b8b4955150bd710b93a87ff7b51a2447fc9bed8247fea678cc17bb1c48671e9c79aed0ae0a680d2d6f6df156bcc9b5af3318bf8ac8832bbec3a01a84805e1240554526ef8669bcd24be7e8c7e255b5099eddac69632601bbe7bf1f87c6eb01ae92f241ba2a51132c1d12d7217e5730d7d58c57a95d0c6ee0abb5430b536509dca35625f9dd6f9c9ad6dcb55c169c88a55b42792be1bfd", 0xb0, 0x0) 06:38:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x2, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068c0", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:07 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000000), 0x2aaaaaaaaaaaabb5) unshare(0x8020400) 06:38:07 executing program 2: msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="d855000000000000000000000000000000f6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x72, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000100)=0x4) 06:38:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x3, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='romfs\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc}}, 0x50) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)=0xb8) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x6, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x8, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x26, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x408, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x40e, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="63657068ff", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:07 executing program 4: unshare(0x8020000) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) unshare(0x8020400) 06:38:07 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.current\x00', 0x0, 0x0) write$P9_RLERROR(r2, &(0x7f0000000340)={0xf, 0x7, 0x1, {0x6, '{user#'}}, 0xf) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x4, 0x9}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000002c0)={r4, 0x40, 0x1}, 0x8) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:07 executing program 2: msgget(0x2, 0x61) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000040)={0x7fffffff, 0x3, 0x7f, 0x0, 0x3, 0x7, 0xec52c026fffc96be}) r2 = msgget(0x0, 0x2) msgrcv(r2, &(0x7f0000000100)={0x0, ""/106}, 0x72, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.mems\x00', 0x2, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080)=0x3ff, &(0x7f00000000c0)=0x4) 06:38:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0xa, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x4, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="66643d544f8c3dd48332d69910258632a20550cb8410d95bb4510d87ac90b605c2fff5d062149f30b6870c01cdd591", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x25, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x801) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x3) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x406, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:08 executing program 4: unshare(0x8020000) semget$private(0x0, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:38:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x407, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0xb, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0xa0008000, 0x3}) 06:38:08 executing program 2: keyctl$set_reqkey_keyring(0xe, 0x7) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x400, 0x10000) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140)=0x284, 0x4) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x800, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x55be) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) 06:38:08 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) kexec_load(0x3, 0x4, &(0x7f0000001240)=[{&(0x7f0000000000)="c15eea395581e5afa96287f3e796bb646ee6d4e0ad350544647996a43fcf7af17e4bf11df5943c0ec747605532497149c1", 0x31, 0x8, 0x5}, {&(0x7f00000000c0)="420640b3156d1bd63d6a700aac75ece80262ee5b291e7fffb1d2ad0a732e9bf360c8af9a045a520e20df69d5aa71f7308886a35caa510e62029032724973f1d884992b8193da334d53ecd746a7193f4d292de1acc2fc6bab98661e082cce7c3daf3fff1599cb07d0f185e41a6c101fb09697bbb90fd9f835517beec6af876cc45db51807b84a9456d9314abdbc1de02cf919299e5e1f368350b2d2c05805441b79491ff84c20a0f869acb5d90c93f3d036224c4c8112df886b337830baa65fcf6d8cb7e6b4774dd7b58b1e32e29108e90c99c86d4310818bbd0b7c07a956a41c6ae84a1ac39750b5513fecd64a318c5e", 0xf0, 0xfffffffffffffff8, 0x6}, {&(0x7f0000000040)="830edcf7a8a1a40b19ee21afb8aafee310", 0x11, 0x65, 0x80000000}, {&(0x7f0000000240)="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", 0x1000, 0xf97f, 0x4}], 0x160000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:38:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) r1 = open(&(0x7f0000000040)='./file0/file0\x00', 0x400002, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 06:38:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x1a0, 0x3}) 06:38:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0xffffffffffffff7f, 0x3}) 06:38:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x100000000000000, 0x3}) 06:38:09 executing program 4: unshare(0x8020000) r0 = semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_INFO(r0, 0x1, 0x13, &(0x7f00000000c0)=""/235) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x60000, 0x0) write$P9_RSTATFS(r2, &(0x7f0000000240)={0x43, 0x9, 0x1, {0x1, 0x9c92, 0x0, 0x9, 0x1f, 0x0, 0x1000, 0xcf, 0x7ff}}, 0x43) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:38:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x135f) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0x20a) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f0000000240)={0x0, 0x8, 0xffffffffffffffff, 0x1, 0x10, 0x100000000}) 06:38:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x8000a0, 0x3}) 06:38:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\a', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x2000000, 0x3}) 06:38:09 executing program 2: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="b38ff8a064f88ad6da3690ca52be651de9bb1dbbcc14a35bfda8b0da52803179237e4b5cbc08fa07e5618528672d282953af0192cbcc1f1636cbf52c4656b1a2936ca46a9e1804ded5f14cfefb3cf211a1af0612d9328c1ac9046a7ec9a75a93bab53132cd1206e7de543233a9b1eabb914ee9c859963e088aeddfd8d7b730ec49f73c176bbe2b78c3c7262f", 0x8c, 0xfffffffffffffffe) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) keyctl$chown(0x4, r0, r1, r2) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/106}, 0x72, 0x0, 0x2000) 06:38:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fcntl$dupfd(r1, 0x406, r2) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0ed0df000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x8000a0ffffffff, 0x3}) 06:38:09 executing program 4: unshare(0x8020000) semget$private(0x0, 0x3, 0x641) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x3ff) unshare(0x8020400) 06:38:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)="6365706803", 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0xa0010000, 0x3}) 06:38:09 executing program 4: unshare(0x20000100) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknod(&(0x7f0000000000)='./file0\x00', 0x9810, 0x3) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:38:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x3000000, 0x3}) 06:38:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x300, 0x3}) 06:38:10 executing program 4: r0 = fanotify_init(0x20, 0x40000) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) unshare(0x8020000) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x10, &(0x7f0000000180)={&(0x7f0000000100)=""/105, 0x69, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r1, 0x10, &(0x7f0000000240)={&(0x7f00000000c0)=""/37, 0x25, r2}}, 0x10) semget$private(0x0, 0x4, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)={{0x10b, 0x13d04, 0x8, 0x208, 0x26, 0x9, 0x3af, 0xffffffffffffffff}, "62aa0d489b80c1339ccd42d2381e691680463fe3f3672e4d9f4b880a835a7674e51db49819417d8c9167b3ba65decbbee408c0290ec31fba8bcf2e565279c5aff24eeb2f9eca89ca6a4841f0f4d09508983756d29b90406b652867ef0cd2369130516549a6ada2858608dbcf204d1f189c975035dd1459fd23e2aecfa20f2556a5a89e9aff0506f242d77b0cfdb8a1b281108b93feacbd814a2e8d90cedf1d", [[], [], [], []]}, 0x4bf) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:38:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r3 = accept(r1, &(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x80) getsockopt$inet6_dccp_int(r3, 0x21, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x8a) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000340)={r4, 0x1, 0x6, @dev={[], 0x16}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0xffffffffa0010000, 0x3}) 06:38:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) chroot(&(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_matches\x00') setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000280)="aa11f20b258fd1becf43b7a429b50e21", 0x10) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) r3 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x4, 0x501000) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000300)) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:10 executing program 2: r0 = msgget$private(0x0, 0x4) msgrcv(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0], 0x1, 0x80000000, 0x2) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x20) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @hyper}, 0x10) 06:38:10 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) timer_create(0x1, &(0x7f0000000000)={0x0, 0x14, 0x3}, &(0x7f0000000040)=0x0) timer_gettime(r1, &(0x7f00000000c0)) unshare(0x8020400) 06:38:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x1a0ffffffff, 0x3}) 06:38:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x7fffffffffffffff, 0x3}) 06:38:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0xffffffffa0008000, 0x3}) 06:38:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x200000000000000, 0x3}) 06:38:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x300000000000000, 0x3}) 06:38:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726fd5f6198f643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x10c7) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:11 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x1000000, 0x3}) 06:38:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x9b7}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other='allow_other'}], [{@measure='measure'}]}}) 06:38:13 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x200000, 0x0) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000340)={{0x4, 0x2, 0x3f, 0x8, '\x00', 0x1a0}, 0x3, 0x110, 0x401, r1, 0x3, 0x8000, 'syz1\x00', &(0x7f0000000300)=['keyringvboxnet1eth0#\x00', '/dev/dsp#\x00', 'cpuset%\'em0\x00'], 0x2b, [], [0x120, 0x199, 0x7fffffff, 0x8]}) unshare(0x8020000) r2 = semget$private(0x0, 0x7, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x3ff, 0x401) ioctl$KVM_GET_MSRS(r4, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="04000000000000000000000000000000090000000000000200000000000000000200000080000000000000000000000c000000000002000000000040000000000000000000000000"]) semget$private(0x0, 0x4007, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) semop(r2, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') getsockopt$bt_sco_SCO_CONNINFO(r5, 0x11, 0x2, &(0x7f00000000c0)=""/231, &(0x7f0000000040)=0xe7) unshare(0x8120400) 06:38:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x2, 0x3}) 06:38:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) socketpair(0xb, 0x80000, 0xfffffffffffffffa, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100001}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r3, 0x70e, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x10) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) write$FUSE_INTERRUPT(r2, &(0x7f0000000380)={0x10, 0x0, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:13 executing program 2: r0 = msgget$private(0x0, 0x59) msgrcv(r0, &(0x7f0000000000)=ANY=[], 0x0, 0x10, 0x0) r1 = msgget(0x0, 0x308) msgsnd(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x90, 0x0) 06:38:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x3, 0x3}) 06:38:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:14 executing program 4: unshare(0x100) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:38:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:14 executing program 4: unshare(0x8020000) semget$private(0x0, 0xfffffffffffffffc, 0x0) socketpair$unix(0x1, 0x10000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@add_del={0x2, &(0x7f00000000c0)='veth1_to_bridge\x00', 0x86e7}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fsetxattr(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='btrfs.trusted.o\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000040)='tzusted.overlay.opaque\x00', 0xffffffffffffff24, 0x2) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:38:14 executing program 2: r0 = msgget$private(0x0, 0x80) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) msgrcv(r0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0xffc) 06:38:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x20000, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') accept$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001cc0)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000001dc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000001e00)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000001fc0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200080}, 0xc, &(0x7f0000001f80)={&(0x7f0000001e40)=ANY=[@ANYBLOB="08010000", @ANYRES16=r3, @ANYBLOB='\b\x00', @ANYRES32=r4, @ANYBLOB="ec0002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000800000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400020000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6], 0x108}, 0x1, 0x0, 0x0, 0x8000}, 0x800) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145628f2303d6d06e5a9db534038b453fa7fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xb) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) 06:38:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:14 executing program 2: r0 = msgget(0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) writev(r1, &(0x7f0000001400)=[{&(0x7f0000000140)="dc83f1bc663b4db30810e198aceb47d64dc2a443b96f36da21f96f1f734f8b6de1a07ea8f7d0d5ca7829b92858afcdc2cbdaa5e27838cf097ddd154ff3de17912e038d4c9c600cda178aa392c6c82f9cc4526c83459aac57336a9db8fd40d8", 0x5f}, {&(0x7f00000001c0)="3c27bbdafda913cd", 0x8}, {&(0x7f0000000200)="05c31372bfc143ec61ec8c0b22a3225be9d9a25a93325ed92f9638afdfaacea6f0ee9930eeeec541c5230fc205b7f265d3", 0x31}, {&(0x7f0000000240)="93a485c07de32baaec81ce526341004676f09905b1b023571c7ba73c076d16239a2cf716ed58e753cc5d955a5db89287182329b1000cf4cb6f4783409bb23ddb874aec083038e3e171013dc87b5646e65bdd95c9c4", 0x55}, {&(0x7f00000002c0)="d380bf642c4450132f5c8a0e343d68dae68d466e441cc30c8aa02d21c647a0f9a95243a9bd25a702f7c22fcff559d9617d4996fee4e16baada2b865cc11cbf81ba6d312836802421773685b72bcc4518dc2d8be6933283ead683db22e48c0d84240f00656d3c8946ec528997f64a8c53158237a3bb2318d2021f496a77ed998629650f588b563143539672e655b1664a8f1c15ed56fcc3d2ed002d783f4feb045deb42eb5846a7cc55c0d2c1c078d4acf154aeaa43a2a450819d24037149cf2398a45e74f0ba3b2c7cd88f9ac0a290faa428220a89c641bc1c45a8dba52d5d5f8b3c532baf8883e2f35368c93ff25d7a96d3c54d2a6b", 0xf6}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="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", 0x1000}], 0x7) msgrcv(r0, &(0x7f0000000080)={0x0, ""/106}, 0x45, 0x0, 0x100) 06:38:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0xfdffffff00000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:15 executing program 4: unshare(0x8020000) semget$private(0x0, 0x0, 0x16) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:38:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67712627df47a0e177726f75705f3c33729a69643dda30b30d4bbd380c1eb3b97c98c400bcd858ee587cb520035a787bd6d7e3584eb11d58b07ea1d6a85ad24fca2e92b0fd2461ca8dffec81e7f747c3a4a6dba0dcd452384e5a99dc90df94c8a24ee3315f1a5fdfd1ab6ff8cdcc6186b300ec131092b31821f304d790680725530ab1bc2950500d9cb89e611119bf3f4d01207d039224e0c7753e7e86af719b75571b9e61b80f234dfa6e8d2eb8bd4b9fc50dd8e066b0bc855d44ab9a035aff82efb862b395eb9c306424b063c4831a7cdbd2cd8585db307aabc23c5698aaffde76d0f22877021af7bcbcd225a0fbb26c", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r2, &(0x7f00000005c0)=ANY=[@ANYRES32], 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) socket(0xb, 0x800, 0x5e4) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x8a) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0xc0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000480)=0xe8) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:15 executing program 2: msgrcv(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a7228dd220fceed8a491b00000000000000000000000000000000000000000000000000000000000000000000000000000000000040"], 0x72, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x40, 0x0) poll(&(0x7f00000000c0)=[{r0, 0x10}], 0x1, 0x5) 06:38:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x300000000000000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:15 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x2b}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000280), 0x15e) unshare(0x8020000) semget$private(0x0, 0x4, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x3, 0x7ff}, 0x2) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x6, 0x4000) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000000)={0x29, 0x6, 0x0, {0x5, 0x4}}, 0x29) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x82f87723979ae5aa}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB="e00100002500040027bd7000fedbdf2500000000", @ANYRES32=r3, @ANYBLOB="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"], 0x1e0}, 0x1, 0x0, 0x0, 0x4000}, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:38:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x101, 0x10000) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000240)={0x0, 0x100000001}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000002c0)={0x3, 0x2, 0x6, 0x100000001, r2}, &(0x7f0000000300)=0x10) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) 06:38:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000040)='./file0\x00', 0xa) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xfffffffffffffff9}}, [0x2, 0xb12, 0x4, 0x261, 0x2, 0x88f, 0xe65b, 0x9, 0x3, 0x0, 0xfd, 0xbc, 0x400, 0xfff, 0x100000001]}, &(0x7f0000000380)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000003c0)={r3, 0x3b, 0xb9ce, 0x3, 0x0, 0x9}, &(0x7f0000000480)=0x14) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x757024a3, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:16 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000011c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1000, 0x1018, 0x2, {"440eb39e583113340d7685a2981f46979a937a6d92e6ebf004de43d6226dfdd006f6a1c49659cf11db40b940097e05db2b0d56da93d1db71e6ef3149453c2779ec3bff42d2e49d30da75ce9b1fbdeb5cf245b7377d299921b19ab7bc23bb57c6bbcf6aa065554841145ce3e76352aa70f40242a3660ad0a2db10ecc4a696f41196e4c65528a029df6e49758d2c9e23c445db813822995b422af21774af132c5dc5ee817af68d392ff428e9fc604fda5b2f142bbe6c7981b5591216b87d2e742c8387a8c43435ecddfacbd53d74bca5763fc4f5b5f7cbd22c23cf2660c1b62b8e267d8bc5e92ed6001b1a064d6ec411097b1a5fd36c919ee754aeb5e790ce34aa6fc3eedbfd5d4cff98e4b02c84b10ef47f6d7248262bf2023ee1d0bc77b771da47376dff58be69517974bd1fbc3ab67804a3b59916408e7e5d43d212700a7684498188301da50fefa81ebdbebc18baf0916d8a78a619db740a830e3847691d81ddd2a4f58f4ad3f80e03ca7cae2fb2a81b1a8c7bb01bde24292085eb73017785d1764f739ede1b5df8970295725c158ba1800ddd0499719c09043eb009845e133b77291a656545f4a5a0cad589004c299a9c2888d94b6df9ac004c78dd61a277f77518d059911001652a413672dee9cd08c959b3ebbb2992a22664c9dc96a5e177077f293cb5b6f50e1ddc84590c9b56014e5baed4b81b6149368284f1e04a30323a350b548e53da35f57703b489cd5a2b44e50515169e9b2328dc7841b5e1d49ebf8113e3b6fcd931e61ffe003e320a30969ddb51c6d411c73324370e17562a368f5472ae0798f9943742aa595972c381523726107f5ce9b9ca15e9cbcae3fffe440ce3a9b94de8ea8f25a6578d00b814573f36dc7b3bd7d652daedeaac00b89ebddf22d4802db964e3608e6a79dda3922751e3457a50024d29e047d19ad601c6a0c2dfc2a2c94c12d89f5d6ef4e05159f3afa743fe86f68e5d5ced90e1c608f9043d8dde218c815590e7afcb88d2967939187eda2a33ec1251eee7cc67ef80b2cf1f8153149a98db18b39167005bebbdf940a2c298f8e0e825918c978669604582c9523b0ee710893333e3d3cc3c79455ef8a185d644adec4baef53229b651e1d408193a02f49866f8665134e62b2099937478deb5e21fa85747e1b42ccd5888bb5c870a28c6f02cce8092fb1f20d1459662c1044deeeda8491fd2788e03e2876f2e35835c7ef5cd6af79a9adabf636c718d320e9bbb8cc9bb4b9d5dc96848f0815698f545ccb44b94719727a124055c5357f66362fe8afd36f5d198e1fd26251b586e885469f9200ae79c608c8a676e511869f89d17d4d02010e7c68c75bd23fde83ef116f794fa59da0b1d4389e223857feda9bc46b6a1db7b5bb1420ea40dc9adb75df6882c8314e66144e1f29001c0ad241bc5b1a49c1ac8bc15c6149763e613a507088c9d80b2fb1b8ce4af04fd6d0ba29da8079410d5ac1145754333ee5d2e523396d8a9d72d8220d31cf7bf1a3b87f3d4649497becbc242e8dac7a32719bcb02e94abf13d85dba1ed4f83cea7e469313f25891027af5272734650530c7aa1b750572723e2204dd45c46e82f266c75434b21f7a11daae2384f7baf5d22ee8471e90b75ed73e8ba4cdc8fd498de8d5da85fc95694e86fcb80ae7dcc5b94b1c605fdfc5b92c240e14f2a0ba47f795c4168ede53d22c336f3b367438b89ac7b34c22346850263f6c76875c7448a156334c4ba2deecde7d446c5b71dfc279f02a8546dd676aa9a0269e6d58ee6a1cb5eacf231aef8d555635cb8fb1ae3b931c4a06fc6e412c37c3c7737b1f5176d8a128d57a48dfe1bfadda08cfc52eca8083bfbe9c32a2a5d24f8857799170cbd6d07dc097c6782eafac6154f87c39caa8e39bddb086ffd70af715c294344c6849c68bb7f4926749317ce11732757b0c8517036a53f263612435b92263eafbf95b1041c278e9505146f91157ffe1397ca042e86b04540ba5e9a83fc171e7b9b49f197666326cc2a1e44bac96e78a9e85d543b1467d025ba83636902c79fcf4f11f1f672ca52ebe903dce21359dd2eed2cefa792c4c46bda0b8dbad08d8e27a6f8fb3aad425edfd24fbeaf932531dd10340b6bfb290987e23a62596b6e67dc23587bf6f80cb66c6174e18fd302c7d3b40bbc24cd34469aa719e03d00bc448681510a4a2d990cdeb8e2e48c233ec326b33b6b72517f6e9b22f875d5e9bdcf85350f2e8828a4a60ae1cb38a05436baa8bc1a861bbf3a00059305ffe02859317a549e6b3b5dd8a1b914998a782e71f057dc296bb00dc387d5c3f54613ea9d57d75bae365c12d44d46ba46e8f06cd89c81e3aef3e05750bd663edc41f1b1e99bf5d2b2058b225b15dad778295cc6e5f1e61fc362ae4894f7d2be67a3205bb7befc779041be6c538d5936e132b5db760df0225b8c93aec3227a0fcc2429b66fa0c55e149865ebdde6bc0df8b570f220093e84c9e67fab974dd3cc453878fb6fb40676eec268135af3601bcaaa2dd91aec3338b70941fcf50812fe23b5c2defe0e6b522e68fe8cbb1984bd6a50d4f168ffd0102ecd3e0c51e092e01cd8acf4980608b0c89e9f370cac5c690acdbc9aa0dbccadd411d7dc967a1cb47bcea18629c4a1498778330df0e8f9dae9695b982474143385620bab24bcb37d90d502afdf6707c5663cf907b25086f1bed3e69fe6f0447f64e93146d6fe78a3df3f6e6806f0a83e51b6d0e9d4b7405139a3574039ad38a061ebc3662acb124a87ea85860a2ab76abc2b1d2d91ba6c66d536b594830e6ec4c9007763ab7ac36c7a3cc5dc1a25cd85d360a8bb3c58278e7e5d3aa8b583379062421f15311ea01ba87cb287109ca58776614de3d16378f2110002e774199d63cb2ad6cfe380ade47f33adf578ea3b442aae7c0c4ee1f116db05c81cbc2dfc9842d6fac35127f48f4a252162808fa6c80b687b816a30b2e29fcb6cd12676163cbc3499c841938e96cb63392a017dfe2428cb0ae39303db90960aa1a44dfd79ac05ac4668548a9012ba276a17ddaaf6663dcf90a5b7027596621df94073061a4230d98e78754d737e6693bca46f6b2654aeed12d6ece0e043db7f93a422afacc3c56c760aead94b46501acbb172b401d60b9c499b08e4dfabd5ff19f7766106e1d56c39e1b5677e62ace92053ec5a6a1cfb25134cb0f23509556aa99d789b097c79b3b8f879a29704d0700f2344aa55e995ee657a2b0bf5194504429779f6bb68e924aae2daa421e096325cb9a570912da489962a5d3db68f16340f2302680c97d0be5c3f2fc8f0be3a04bc38bc828b1031a7c1d8a90e34ec45ba17416bbe146faf8b1312cf3efcf81a17c7dc862ced05fe2548f4bca2af5941f93c541635b5b62e6ac700eca502ff4559e9a0b3b950a71404380182d948fb628e18d216aebb24337cdce1854ae3916e0e1291477bb6e3e0cf109a25d2b77d4c232e5d803b18fa6586caa85008955b127d05bd69c3f8343bf97a66f2e3b434afabb3ef2586e7863917476d58bb616f81d7aff85e7e266c1dcf74ec323b593d359389074430dacf062c6ce94a29951448c3d2b08e21da5a33499d8cb0b9f3d0a727b148d07d4ab6d5595590463d567d04ca8b4cc13061779407513b9d470af7174bc6dfc814355a2e1cec42a420a930ccdb112948d0eee0f77979999857576f1b74ad71bbf412ee5350bdf2f64a29dc68f74228dd10458ad1fc6ee57547300ef91dff3bf52390b82fd5f42c7469862e8deeeeb53e5279df64aa7716e1debbdd050e76a5cdaf51927d0fc789287669922083f09962bc76c68caefd4611382c825ddbdf38085db873177a98522db46982e0864d30da7f6041c6706a5dac2c992c65b32253bae270fee08162cef183f56f5b1ac2909a1bec2556c9bcff70cd51c38d7b1823fe79c15646ac47e93aa5babfd1f238f8736a8489bc180258ca2b6d7193dc68f55f3ae4a0c6a9538766fbff44ea73d923fcd25356531ff45d7425e92c7d1dc202aec71237e3cee807a31ba9b7e0389eb23a3231308041689d34d92aff9b767989c5514c6893af72f23c2f5b28df2a98f21c11dea8dcb8cbe8feec636ee1ab8fbb1f98792eae7bde488a9628c64055d6a4ac86513441c6ff52692bf99c639c11f11d4be9499dc1eaa6dfd29cf5e1c247332858bf82393fe770985c63ae4d37c55c57762c2552a0c0cc850e30479a24b76565f563b6985f6e54f4dc0daa7b1cda64658f358eab8d705602ae2cdf864f54d50c0a8a85021883e4a8397e58fe74edd93e563f1fa132aa414a535fc0d19f0c609eb55ca22657466dbbf12306e2ff4fb8348c64ea0f86c1536160867fef9999d1b9586e2099400f466a1a30afef9e63fea9e4588d6d9b8c4c19d6956a032c162080d534300657ba1a42fc58df4b693fe3e31401375dec2bb3c6caee72c26d2707aba0ac80b2313c22ab300003509173696f67c8b40131481125556968396cf850ec80100d3500b77b90948d3f1206359fb9e1e17f512d08a472135cc57874c65ac10c2be1c3175a83fe3642b8698f3302283a4712d3f732debac139cca58f60a36c9c00fd22c0863514b51d2a649960ad89f5ad928b8d8be3be7a0a9a986ad118b6de6f993923a35234be8b31eefcf521845d9d0894c9a2ab5b11cc9edcef0e4f95b51ccccd9f79bc7977d5bc9cb1d815be5628741dbea974212473038c30302a3895cd2b5a79e46d80fb8cec3311ec54b429564fa2fc0f01ca608a8cc9b12ffd19960aae562a9bfd1a6a9922e51c50149a422c7adc4e41f4c0fcbc2ad18462b24d679dbe4f6045f6de333b824f2a6387429040722906b9a31eab74eb7629b4703bc3bd1cd3f68fbd370f82e686fb6ea718feb8f3dc1e075a97394c6e78b1b970d2ea1261c0baca3d7e9c12f73bf2fe8cac0e75bf91350996b25a5e21e20181501406e323ca9fdf31ca1e301a77354a7f3ce5cbae78010910cc3c7c5d803b3d0c34da2aee598bdff50eb7176d37aa5bef639f280d5a24c98224d1b36df435301d7a43e0d6477c3a3a08bfbf19d6a24b65c5c2db6e6d8e6cfecbaabe6fe053173e0a210dc1d38c139d512ecfef20679495ba6d2479b8cbcfe71cacdb133b87e6f95e3eae586825e1b73a48b98801b68a6e5359b5abe0016be550792b6bc2f27ceecaf6e552d123bbfde6e3039f2a213d973eb252ad4511b4a75664b22a1be9fc1cdfb1b0dab3394d24be4e5a6389d9275e5493502bb76042a893cc7a86139c1cef7c4c2ebe4b97384a57f01898d7b7949c84d3226f4eec6d90076c0fd56562faa92c588e27f0cd57b5c6b35dafb3566af0b7dcbae55513b0058734876a87708536004cf300af2f7c99a55a7c8e64b6daf6ee155a7c1b612f51086b7d90e2fe041cfc8f80eb24b4a7c8b966891dfd27385858c156b4ce7a5bf5fc428b65a93645b801c5bffe2ff3c380b4e8d523084101a134b8b4994e5f70d1185cc86859f2804a7429075e9c5c1d04a5a7dec91031a86b56fb4743220bd13cc806e696770f0520237025834b5abee55c2635c71d9b083a45f36a02117a98dc225ae690d05a4c752c0cddad26297e34a2e350e53c083db045350052d6c23a178548da2415b8d740f45f42a755525d5c132def60a263b1b732a8c70b0d8d8bf847131aea1c396ae104229272cf93e24cc343ee5effc8e93c396dcbb72daa7175603a9ed4d867c6a5b375f88ddbe4d0e714091a0d66f5179e35b840d01fb68a14d2f1c8f43f1e26ace100771a36e69eaded1b62b982e08ab02a724e1220"}}, {0x0, "5a2218886c1f7e784c5f3ce52053adab25142c5c029af3b5819ecc7438ff380390bd3045555e464d357b5ea60d252d547f892fca0012b4e2e3ea9d37618266de42d55915d2ff404f23af37"}}, &(0x7f0000001100)=""/192, 0x1065, 0xc0}, 0x20) msgget$private(0x0, 0x103) r1 = msgget(0x1, 0x0) msgrcv(r1, &(0x7f0000001500)=ANY=[@ANYRESDEC, @ANYRESHEX, @ANYRESOCT=0x0, @ANYRES32=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000001300)=ANY=[@ANYRESOCT=r0, @ANYBLOB="d1a99356cfd783833b39b1756e0a47fbe4c9eeea487ef17ace2fc3bb9e27adffc51b3904a1b0ee1d8c64b48e8f2ea982e493eb63778b675701e104eb8a9facd3baab80036fc507a376a61afcf0c71c7d89b708b9993fe078e4"], @ANYRES32, @ANYPTR=&(0x7f0000001480)=ANY=[@ANYRES16, @ANYPTR, @ANYRESHEX=r0, @ANYRES32=r0, @ANYRESDEC=r0, @ANYRES64=r0, @ANYRES64=r0, @ANYPTR=&(0x7f0000001380)=ANY=[@ANYPTR, @ANYBLOB="4bd5dbc26e547f5dea07bfacfe16d1df736b895c16292e98a95f7612fa3799a7e405eba0091b51421b87edc9f37d7a7691a2fd0e85d5380c72653e", @ANYRESDEC=0x0, @ANYRESDEC=r0, @ANYRESOCT=r0, @ANYBLOB="d359a3f977af642fe9af21f295fab643c04706be158e58983638b07349f4437c46d447eae0c04a9bbf2d567d67a794d40b06b64c5b5a976e181a0b13c7a5acccc2db839f58ce", @ANYPTR, @ANYRESDEC=r0]], @ANYRES16=r0, @ANYRES32=r0], 0xa, 0x3, 0x1000) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x40, 0x0) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000040)) 06:38:16 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1f1, 0x10002) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x4, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000140), 0x8) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xfffffffffffffc00, 0x210000) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x220000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8120400) 06:38:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3}) 06:38:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0xfffffffffffffc9d) umount2(&(0x7f0000000180)='./file0\x00', 0xa) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x59f, 0x400) ioctl$VIDIOC_G_PRIORITY(r2, 0x80045643, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:16 executing program 2: msgrcv(0x0, &(0x7f0000000080)={0x0, ""/106}, 0x72, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000040)) 06:38:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x7fffffffffffffff}) 06:38:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x4000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000001400c6da0000000b000000000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x90) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x4005d50}) 06:38:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x4005d52}) 06:38:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) write$FUSE_LK(r1, &(0x7f0000000240)={0x28, 0x0, 0x4, {{0x3, 0x6, 0x3, r2}}}, 0x28) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f00000002c0)={0x33, 0x1c, 0xb, 0x12, 0x9, 0x8, 0x2, 0x4d}) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3fe}) 06:38:17 executing program 4: unshare(0x440c03fff9) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:38:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x4005d4f}) 06:38:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @aes256, 0x1, "8853874e9242e74d"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x5}, 0x5e) umount2(&(0x7f0000000180)='./file0\x00', 0xa) write$FUSE_DIRENT(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000100000066ce656d316e6f246576656d31000002000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c94f5a3276ce8c946100000000000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce145fe700471595c"], 0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:38:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x4005d51}) 06:38:17 executing program 4: unshare(0x8020000) semget$private(0x0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x400, 0x40) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000040)=0xcd1) semget$private(0x0, 0x4007, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x5, 0x1000}], 0x1) unshare(0x8020400) 06:38:17 executing program 2: msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x72, 0x0, 0x0) 06:38:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3ff}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) fcntl$lock(r1, 0x7, &(0x7f0000000140)={0x2, 0x0, 0x3, 0xffffffffa0010000}) [ 1253.716876] kworker/dying (21) used greatest stack depth: 12672 bytes left [ 1333.076681] INFO: task syz-executor5:25843 blocked for more than 140 seconds. [ 1333.084058] Not tainted 4.19.0+ #313 [ 1333.088369] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1333.096433] syz-executor5 D23960 25843 5825 0x00000004 [ 1333.103189] Call Trace: [ 1333.105835] __schedule+0x8cf/0x21d0 [ 1333.109804] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1333.115189] ? __sched_text_start+0x8/0x8 [ 1333.119548] ? trace_hardirqs_off_caller+0x310/0x310 [ 1333.124664] ? lock_downgrade+0x900/0x900 [ 1333.128866] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1333.133980] ? prepare_to_wait_event+0x39f/0xa10 [ 1333.138797] ? prepare_to_wait_exclusive+0x480/0x480 [ 1333.143910] schedule+0xfe/0x460 [ 1333.147513] ? __schedule+0x21d0/0x21d0 [ 1333.151507] ? end_requests+0x450/0x450 [ 1333.155576] ? perf_trace_sched_process_exec+0x860/0x860 [ 1333.161294] ? replenish_dl_entity.cold.55+0x36/0x36 [ 1333.166413] ? __might_sleep+0x95/0x190 [ 1333.170445] fuse_wait_aborted+0x20b/0x320 [ 1333.174796] ? fuse_force_forget+0x2a0/0x2a0 [ 1333.179290] ? finish_wait+0x430/0x430 [ 1333.183230] ? __kasan_slab_free+0x119/0x150 [ 1333.187692] ? unregister_shrinker+0x270/0x460 [ 1333.192388] ? unregister_shrinker+0x298/0x460 [ 1333.197031] ? prepare_kswapd_sleep+0x220/0x220 [ 1333.201716] fuse_sb_destroy+0xe2/0x1d0 [ 1333.205677] fuse_kill_sb_anon+0x15/0x20 [ 1333.209963] deactivate_locked_super+0x97/0x100 [ 1333.214650] deactivate_super+0x2bb/0x320 [ 1333.218852] ? get_super_exclusive_thawed+0x20/0x20 [ 1333.224047] ? fsnotify_destroy_marks+0x1d2/0x270 [ 1333.229333] ? shrink_dcache_sb+0x350/0x350 [ 1333.233686] ? cpumask_next+0x41/0x50 [ 1333.237792] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1333.242883] ? mnt_get_writers.isra.26+0xf8/0x150 [ 1333.247785] cleanup_mnt+0xbf/0x160 [ 1333.251441] __cleanup_mnt+0x16/0x20 [ 1333.255144] task_work_run+0x1e8/0x2a0 [ 1333.259095] ? task_work_cancel+0x240/0x240 [ 1333.263860] ? trace_hardirqs_off_caller+0x310/0x310 [ 1333.269029] exit_to_usermode_loop+0x318/0x380 [ 1333.273630] ? __bpf_trace_sys_exit+0x30/0x30 [ 1333.278201] ? ksys_mount+0xa8/0x140 [ 1333.281928] do_syscall_64+0x6be/0x820 [ 1333.285808] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1333.291235] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1333.296176] ? trace_hardirqs_on_caller+0x310/0x310 [ 1333.301238] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1333.306261] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1333.313127] ? __switch_to_asm+0x40/0x70 [ 1333.317225] ? __switch_to_asm+0x34/0x70 [ 1333.321278] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1333.326110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1333.331341] RIP: 0033:0x457569 [ 1333.334561] Code: Bad RIP value. [ 1333.337968] RSP: 002b:00007fc425597c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1333.345696] RAX: ffffffffffffffea RBX: 0000000000000005 RCX: 0000000000457569 [ 1333.353074] RDX: 00000000200001c0 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1333.360388] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1333.367722] R10: 0000000000004000 R11: 0000000000000246 R12: 00007fc4255986d4 [ 1333.374993] R13: 00000000004c2b0c R14: 00000000004d4180 R15: 00000000ffffffff [ 1333.382335] [ 1333.382335] Showing all locks held in the system: [ 1333.388709] 1 lock held by khungtaskd/1007: [ 1333.393016] #0: 000000007fd527cd (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 1333.401683] 2 locks held by rsyslogd/5541: [ 1333.405922] #0: 0000000043cc5f2f (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 1333.414198] #1: 00000000a73cd7cb (&rq->lock){-.-.}, at: __schedule+0x236/0x21d0 [ 1333.421809] 2 locks held by getty/5631: [ 1333.425844] #0: 0000000092dc41b7 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1333.434148] #1: 00000000663e4b8d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1333.443052] 2 locks held by getty/5632: [ 1333.447066] #0: 00000000ea7e291d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1333.455313] #1: 00000000ab98486e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1333.464239] 2 locks held by getty/5633: [ 1333.468237] #0: 00000000dc3f8070 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1333.476465] #1: 00000000f19d32e8 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1333.485968] 2 locks held by getty/5634: [ 1333.489989] #0: 00000000c2b10ed5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1333.498285] #1: 00000000d11d48fc (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1333.507189] 2 locks held by getty/5635: [ 1333.511163] #0: 0000000003c090b9 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1333.519457] #1: 0000000089f64a51 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1333.528369] 2 locks held by getty/5636: [ 1333.532325] #0: 000000001b949925 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1333.540611] #1: 00000000d9fe03d1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1333.549525] 2 locks held by getty/5637: [ 1333.553482] #0: 000000003f0d40d8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1333.561833] #1: 00000000e87fb2ea (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1333.570741] 1 lock held by syz-executor5/25843: [ 1333.575412] #0: 000000008cc8fa1c (&type->s_umount_key#46){+.+.}, at: deactivate_super+0x2b3/0x320 [ 1333.584561] [ 1333.586192] ============================================= [ 1333.586192] [ 1333.593259] NMI backtrace for cpu 1 [ 1333.596920] CPU: 1 PID: 1007 Comm: khungtaskd Not tainted 4.19.0+ #313 [ 1333.603571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1333.612909] Call Trace: [ 1333.615482] dump_stack+0x244/0x39d [ 1333.619099] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1333.624276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1333.629802] nmi_cpu_backtrace.cold.2+0x5c/0xa1 [ 1333.634523] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 1333.639702] nmi_trigger_cpumask_backtrace+0x1e8/0x22a [ 1333.644964] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1333.650137] watchdog+0xb51/0x1060 [ 1333.653668] ? hungtask_pm_notify+0xb0/0xb0 [ 1333.657977] ? __kthread_parkme+0xce/0x1a0 [ 1333.662209] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1333.667316] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1333.672404] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1333.676971] ? trace_hardirqs_on+0xbd/0x310 [ 1333.681287] ? kasan_check_read+0x11/0x20 [ 1333.685423] ? __kthread_parkme+0xce/0x1a0 [ 1333.689649] ? trace_hardirqs_off_caller+0x310/0x310 [ 1333.694739] ? trace_hardirqs_off_caller+0x310/0x310 [ 1333.699843] ? lockdep_init_map+0x9/0x10 [ 1333.703893] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1333.708983] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1333.714505] ? __kthread_parkme+0xfb/0x1a0 [ 1333.718724] ? hungtask_pm_notify+0xb0/0xb0 [ 1333.723030] kthread+0x35a/0x440 [ 1333.726381] ? kthread_stop+0x900/0x900 [ 1333.730342] ret_from_fork+0x3a/0x50 [ 1333.734171] Sending NMI from CPU 1 to CPUs 0: [ 1333.738811] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0x6/0x10 [ 1333.739745] Kernel panic - not syncing: hung_task: blocked tasks [ 1333.752511] CPU: 1 PID: 1007 Comm: khungtaskd Not tainted 4.19.0+ #313 [ 1333.759159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1333.768629] Call Trace: [ 1333.771205] dump_stack+0x244/0x39d [ 1333.774817] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1333.780102] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1333.785112] panic+0x2ad/0x55c [ 1333.788290] ? add_taint.cold.5+0x16/0x16 [ 1333.792441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1333.797976] ? nmi_trigger_cpumask_backtrace+0x1d1/0x22a [ 1333.803415] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 1333.808862] watchdog+0xb62/0x1060 [ 1333.812410] ? hungtask_pm_notify+0xb0/0xb0 [ 1333.816721] ? __kthread_parkme+0xce/0x1a0 [ 1333.820943] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1333.826115] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1333.831211] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1333.835783] ? trace_hardirqs_on+0xbd/0x310 [ 1333.840089] ? kasan_check_read+0x11/0x20 [ 1333.844221] ? __kthread_parkme+0xce/0x1a0 [ 1333.848443] ? trace_hardirqs_off_caller+0x310/0x310 [ 1333.853637] ? trace_hardirqs_off_caller+0x310/0x310 [ 1333.858732] ? lockdep_init_map+0x9/0x10 [ 1333.862795] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1333.868171] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1333.873697] ? __kthread_parkme+0xfb/0x1a0 [ 1333.877922] ? hungtask_pm_notify+0xb0/0xb0 [ 1333.882227] kthread+0x35a/0x440 [ 1333.885580] ? kthread_stop+0x900/0x900 [ 1333.889549] ret_from_fork+0x3a/0x50 [ 1333.894423] Kernel Offset: disabled [ 1333.898049] Rebooting in 86400 seconds..